Enviar #93558: Moosikay - E-Commerce System v1.0 /Moosikay/order.php post parameter 'username' exists SQL injection vulnerabilityinformación

TítuloMoosikay - E-Commerce System v1.0 /Moosikay/order.php post parameter 'username' exists SQL injection vulnerability
DescripciónAn issue was discovered in Moosikay - E-Commerce System v1.0. There is a SQL injection that can directly issue instructions to the background database system via /Moosikay/order.php post parameter username. Error injection payload: username=a'&password=b&login= Delayed injection payload:username=a' and (select 1 FROM (select(sleep(10)))a)-- b&password=b&login=
Fuente⚠️ https://github.com/jidle123/bug_report/blob/main/vendors/razormist/Moosikay%20-%20E-Commerce%20System/SQLi-1.md
Usuario
 jidle (UID 41297)
Sumisión2023-02-23 10:10 (hace 3 años)
Moderación2023-02-24 08:29 (22 hours later)
EstadoAceptado
Entrada de VulDB221732 [SourceCodester Moosikay E-Commerce System 1.0 POST Parameter /Moosikay/order.php Nombre de usuario inyección SQL]
Puntos18

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!