提出 #441917: Code4Berry Decoration Management System 1.0 SQL Injection情報

タイトルCode4Berry Decoration Management System 1.0 SQL Injection
説明 There is a SQL injection vulnerability at the /decoration/admin/btndates_report.php endpoint. You can filter the "Between Dates Reports" to focus on a range of dates by sending a POST request to this endpoint with the multipart/form-data syntax. You can find a SQLI vulnerability in the "fromdate" and "todate" parameters by sending a request like this: ------WebKitFormBoundarymSRx4RCtQnt9h30W Content-Disposition: form-data; name="fromdate" 2024-11-04 ------WebKitFormBoundarymSRx4RCtQnt9h30W Content-Disposition: form-data; name="todate" 2024-11-29'+(select*from(select(sleep(20)))a)+' ------WebKitFormBoundarymSRx4RCtQnt9h30W Also - this endpoint shouldn't be available to regular users but there is nothing preventing you from visiting it or sending the SQLI POST request, as long as you have a valid logged in session. Thanks for reading!!
ユーザー
 scumdestroy (UID 48934)
送信2024年11月12日 04:48 (1 年 ago)
モデレーション2024年11月20日 09:11 (8 days later)
ステータス承諾済み
VulDBエントリ285502 [Code4Berry Decoration Management System 1.0 Between Dates Reports btndates_report.php fromdate/todate SQLインジェクション]
ポイント17

Want to know what is going to be exploited?

We predict KEV entries!