Soumettre #665475: Ecommerce-Clothing-Website web 1 SQL Injectioninformation

TitreEcommerce-Clothing-Website web 1 SQL Injection
DescriptionEcommerce-Clothing-Website has an SQL injection vulnerability: In the /log.php file of the website, lines 69-79, the user input password (log_pass) is directly concatenated into the SQL query to fetch users without any filtering, resulting in an SQL injection vulnerability in the login functionality. By entering 'or'1'='1 in the password input box, the password verification can be bypassed to log in successfully. The project setup requires downloading the project from GitHub https://github.com/yousaf530/Ecommerce-Clothing-Website.
La source⚠️ https://github.com/mhszed/Report/blob/main/Ecommerce-Clothing-Website%20sql.docx
Utilisateur
 mahushuai (UID 91047)
Soumission30/09/2025 04:02 (il y a 7 mois)
Modérer12/10/2025 08:26 (12 days later)
StatutAccepté
Entrée VulDB328071 [yousaf530 Inferno Online Clothing Store /log.php cemail/password injection SQL]
Points20

Want to know what is going to be exploited?

We predict KEV entries!