Submit #42881: Unauthenticated SQL injection in Fee Management System in login page.
Title | Unauthenticated SQL injection in Fee Management System in login page. |
---|---|
Description | Fee Management System source code URL: https://www.sourcecodester.com/php/15357/best-fee-management-system-project-php-source-code.html in admin_class.php function login(){ extract($_POST); $qry = $this->db->query("SELECT * FROM users where username = '".$username."' and password = '".md5($password)."' "); ...... } the usename and password variables is directly spliced into sql statement. In login page, anyone can login with the below parameters: username: admin' or 1=1# password: whatever |
Source | ⚠️ https:/ |
User | zhangguohu (ID 30684) |
Submission | 05/08/2022 11:44 (2 years ago) |
Moderation | 05/08/2022 12:43 (59 minutes later) |
Accepted | Accepté |
VulDB Entry | VDB-205658 |