提出 #690087: Report_Online-Banking-System web 1.0 SQL Injection情報

タイトルReport_Online-Banking-System web 1.0 SQL Injection
説明Vulnerability Title:SQL Injection in Online Banking System Login Function Vulnerability Details: Multiple SQL injection vulnerabilities were identified in the customer and staff login interfaces of the Online Banking System. The vulnerabilities allow unauthenticated attackers to extract sensitive database information including user credentials, database structure, and other confidential data. Affected Components: Customer Login Page (/banking/index.php) Staff Login Page (/banking/staff_login.php) Proof of Concept: Navigate to the login page In username field, enter: 1' AND extractvalue(1,concat(0x7e,database()))-- System returns: XPATH syntax error: '~bnak_db' Database name bnak_dbis successfully extracted Impact: Attackers can completely compromise the database containing customer financial information and administrative credentials. Environment: PHP-based web application MySQL database Reproducible in standard LAMP/Windows environments
ソース⚠️ https://github.com/Nianalb/Report_Online-Banking-System/blob/main/SQL.docx
ユーザー
 Nianalb (UID 91431)
送信2025年11月06日 15:29 (6 月 ago)
モデレーション2025年11月16日 21:24 (10 days later)
ステータス承諾済み
VulDBエントリ332611 [g33kyrash Online-Banking-System 迄 12dbfa690e5af649fb72d2e5d3674e88d6743455 /index.php ユーザー名 SQLインジェクション]
ポイント20

Do you want to use VulDB in your project?

Use the official API to access entries easily!