Submit #468541: code-projects Travel Management System Using PHP 1 SQL Injectioninfo

Titlecode-projects Travel Management System Using PHP 1 SQL Injection
DescriptionThe SQL Injection vulnerability exists in diretory '/travel/package.php?subcatid=18' because the 'subcatid' parameter is directly inserted into the SQL queries without any validation or sanitization. If an attacker inputs malicious SQL code as the 'subcatid' parameter, it will be executed by the database. For example, if the 'subcatid' parameter is set to "18' AND (SELECT 5950 FROM (SELECT(SLEEP(5)))CYlN) AND 'nrPR'='nrPR", it could manipulate the query to return or modify unintended data. Always use prepared statements or parameterized queries to prevent this. Payload: subcatid=18' AND (SELECT 5950 FROM (SELECT(SLEEP(5)))CYlN) AND 'nrPR'='nrPR
Source⚠️ https://code-projects.org/travel-management-system-using-php-source-code/
User
 Fergod (UID 55882)
Submission12/24/2024 06:00 PM (3 months ago)
Moderation12/25/2024 07:11 PM (1 day later)
StatusAccepted
VulDB Entry289312 [code-projects Travel Management System 1.0 /package.php subcatid sql injection]
Points20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!