提出 #563175: SourceCodester Stock Management System (SMS-PHP by oretnom23) 1.0 SQL Injection情報

タイトルSourceCodester Stock Management System (SMS-PHP by oretnom23) 1.0 SQL Injection
説明1. Vulnerability Overview Vulnerable Endpoint: /sms/classes/Login.php?f=login Vulnerable Parameter: username Issue Type: SQL Injection - Authentication Bypass Severity: High (Critical) – Unauthorized access can be gained to the system, leading to potential unauthorized actions. Software URL: https://www.sourcecodester.com/php/15023/stock-management-system-phpoop-source-code.html 2. Vulnerability Description The Stock Management System software contains a SQL Injection vulnerability on the login page that leads to an authentication bypass. This vulnerability is triggered by the improper sanitization of user inputs, specifically the username parameter. Attackers can exploit this flaw to bypass the authentication mechanism and gain access to the system with admin privileges.
ソース⚠️ https://github.com/th3w0lf-1337/Vulnerabilities/blob/main/SMS-PHP/SQLi/Auth-Bypass/info.md
ユーザー
 Th3W0lf (UID 84351)
送信2025年04月21日 20:03 (11 月 ago)
モデレーション2025年05月05日 13:33 (14 days later)
ステータス承諾済み
VulDBエントリ307391 [SourceCodester/oretnom23 Stock Management System 1.0 Login.php?f=login ユーザー名 SQLインジェクション]
ポイント20

Interested in the pricing of exploits?

See the underground prices here!