إرسال #287648: keerti1924 PHP-MYSQL-User-Login-System 1.0 SQL Injectionالمعلومات

عنوانkeerti1924 PHP-MYSQL-User-Login-System 1.0 SQL Injection
الوصفA SQL injection vulnerability was discovered in the login.php script of the PHP-MYSQL-User-Login-System developed by keerti1924. By injecting malicious SQL code via the 'email' parameter, attackers can bypass authentication and gain unauthorized access to the application. The flaw allows for the execution of a UNION SELECT statement, enabling retrieval of sensitive data. Notably, successful exploitation requires the 'password' parameter to match the hash of the injected password, exacerbating the risk of unauthorized access.
المصدر⚠️ https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20PHP-MYSQL-User-Login-System/SQLI%20Auth.md
المستخدم
 nochizplz (UID 64302)
ارسال25/02/2024 07:00 AM (2 سنوات منذ)
الاعتدال07/03/2024 03:34 PM (11 days later)
الحالةتمت الموافقة
إدخال VulDB256034 [keerti1924 PHP-MYSQL-User-Login-System 1.0 /login.php email حقن SQL]
النقاط20

Do you need the next level of professionalism?

Upgrade your account now!