| Titel | Project-Online-Shopping-Website web 1 SQL Injection |
|---|
| Beschreibung | The "Project-Online-Shopping-Website" project has an SQL injection vulnerability, which exists in the /delete.php file. The code directly concatenates the user input product_code into the SQL DELETE statement without any security handling. For example, inputting 'OR '1'='1 will generate DELETE FROM products WHERE product_code='' OR '1'='1', causing all data in the table to be deleted. To reproduce the project, first download it from GitHub (https://github.com/jimit105/Project-Online-Shopping-Website) and set it up. The vulnerability can be verified by entering 'OR '1'='1 in the "Product Code" field on delete.php, which redirects to remove_product.php. Upon submission, the Inventory page will show that all products have been deleted, confirming the existence of the vulnerability. |
|---|
| Quelle | ⚠️ https://github.com/mhszed/Report/blob/main/Project-Online-Shopping-Website%20exit%20sql.docx |
|---|
| Benutzer | mahushuai (UID 91047) |
|---|
| Einreichung | 28.09.2025 18:03 (vor 7 Monaten) |
|---|
| Moderieren | 11.10.2025 15:42 (13 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 328040 [jimit105 Project-Online-Shopping-Website bis 7d892f442bd8a96dd242dbe2b9bd5ed641e13e64 Product Inventory /delete.php product_code SQL Injection] |
|---|
| Punkte | 20 |
|---|