Soumettre #563231: SourceCodester Stock Management System (SMS-PHP by oretnom23) 1.0 SQL Injectioninformation

TitreSourceCodester Stock Management System (SMS-PHP by oretnom23) 1.0 SQL Injection
DescriptionA SQL injection vulnerability was found in the Purchase Order page of the Stock Management System `(/sms/admin/?page=purchase_order/view_po&id=2)`. This vulnerability allows an attacker to inject arbitrary SQL queries through the `id` parameter. Specifically, it is possible to extract sensitive data from the `users` table, including usernames and MD5 hashed passwords, by exploiting the vulnerability with a UNION-based SQL injection payload.
La source⚠️ https://github.com/th3w0lf-1337/Vulnerabilities/blob/main/SMS-PHP/SQLi/PO/info.md
Utilisateur
 Th3W0lf (UID 84351)
Soumission21/04/2025 22:16 (il y a 12 mois)
Modérer04/05/2025 20:17 (13 days later)
StatutAccepté
Entrée VulDB307371 [SourceCodester/oretnom23 Stock Management System 1.0 Purchase Order Details Page view_po ID injection SQL]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!