Title | SQL injection vulnerability in the Stock Management System |
---|
Description | Build environment: Apache 2.4.39; MySQL5.7.26; PHP7.3.4;SQL injection vulnerability in Stock Management System;In processlogin PHP, in lines 7 to 9 of the code, the back-end receives the user and password parameters passed through by the front-end, and encrypts the password with sha1; In lines 18 to 25 of the code, the user and password are substituted into the database for query verification. During this process, SQL injection vulnerabilities are created without filtering;Executed SQL statements in the database,resulting in SQL injection vulnerabilities,SQL injection vulnerability can obtain database sensitive information |
---|
Source | ⚠️ https://github.com/rickxy/Stock-Management-System/issues/2 |
---|
User | ace. (ID 34853) |
---|
Submission | 21/11/2022 12:55 (1 Year ago) |
---|
Moderation | 24/11/2022 10:10 (3 days later) |
---|
Status | Accepté |
---|
VulDB Entry | 214322 |
---|