| عنوان | SourceCodester/oretnom23 Stock Management System (SMS-PHP by oretnom23) 1.0 SQL Injection |
|---|
| الوصف | A SQL injection vulnerability was found in the Return List page of the Stock Management System `(/sms/admin/?page=return/view_return&id=1)`. This vulnerability allows an attacker to inject arbitrary SQL queries through the `id` parameter. Specifically, it is possible to extract sensitive data from the `users` table, including usernames and MD5 hashed passwords, by exploiting the vulnerability with a UNION-based SQL injection payload. |
|---|
| المصدر | ⚠️ https://github.com/th3w0lf-1337/Vulnerabilities/blob/main/SMS-PHP/SQLi/Return-List/info.md |
|---|
| المستخدم | Th3W0lf (UID 84351) |
|---|
| ارسال | 06/05/2025 06:11 PM (12 أشهر منذ) |
|---|
| الاعتدال | 15/05/2025 06:01 PM (9 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 309095 [SourceCodester/oretnom23 Stock Management System 1.0 view_return معرف حقن SQL] |
|---|
| النقاط | 20 |
|---|