| शीर्षक | ScriptAndTools Real Estate Management System 1.0 SQL Injection |
|---|
| विवरण | Title of the Vulnerability:
Script And Tools | Real Estate Management System 1.0 | SQL Injection Admin Bypass In /admin/
Vulnerability Class: SQL Injection
Product Name: Real Estate Management System
Vendor: https://github.com/scriptandtools/
Vulnerable Product Link: https://github.com/scriptandtools/Real-Estate-website-in-PHP
Technical Details & Description:
The application source code is coded in a way which allows To Access /admin/ via SQL Injection Admin Bypass Payloads!
Product & Service Introduction: Real Estate Management System
Observation & Exploitation:
Here,The Vulnerable File Is:
/admin/addpackage.php
Lets Exploit ????????️????:
Step-1:
First,Go To The Vulnerable Location:
Example:
http://192.168.0.100:8080/reali/admin/
Step-2:
Now use SQL Admin Bypass Payloads Like:
' or 1=1 limit 1 -- -+
use it in both username and password field!
And you will be logged in the admin panel then!
So,This indicates that the /admin/ is vulnerable to SQL Injection |
|---|
| स्रोत | ⚠️ https://www.websecurityinsights.my.id/2025/05/script-and-tools-real-estate-management.html |
|---|
| उपयोगकर्ता | MaloyRoyOrko (UID 79572) |
|---|
| सबमिशन | 04/05/2025 04:28 PM (12 महीनों पहले) |
|---|
| संयम | 23/05/2025 08:17 PM (19 days later) |
|---|
| स्थिति | स्वीकृत |
|---|
| VulDB प्रविष्टि | 310206 [ScriptAndTools Real-Estate-website-in-PHP 1.0 Admin Login Panel /admin/ पासवर्ड SQL इंजेक्शन] |
|---|
| अंक | 20 |
|---|