Soumettre #441917: Code4Berry Decoration Management System 1.0 SQL Injectioninformation

TitreCode4Berry Decoration Management System 1.0 SQL Injection
Description There is a SQL injection vulnerability at the /decoration/admin/btndates_report.php endpoint. You can filter the "Between Dates Reports" to focus on a range of dates by sending a POST request to this endpoint with the multipart/form-data syntax. You can find a SQLI vulnerability in the "fromdate" and "todate" parameters by sending a request like this: ------WebKitFormBoundarymSRx4RCtQnt9h30W Content-Disposition: form-data; name="fromdate" 2024-11-04 ------WebKitFormBoundarymSRx4RCtQnt9h30W Content-Disposition: form-data; name="todate" 2024-11-29'+(select*from(select(sleep(20)))a)+' ------WebKitFormBoundarymSRx4RCtQnt9h30W Also - this endpoint shouldn't be available to regular users but there is nothing preventing you from visiting it or sending the SQLI POST request, as long as you have a valid logged in session. Thanks for reading!!
Utilisateur
 scumdestroy (UID 48934)
Soumission12/11/2024 04:48 (il y a 1 Année)
Modérer20/11/2024 09:11 (8 days later)
StatutAccepté
Entrée VulDB285502 [Code4Berry Decoration Management System 1.0 Between Dates Reports btndates_report.php fromdate/todate injection SQL]
Points17

Might our Artificial Intelligence support you?

Check our Alexa App!