제출 #385894: itsourcecode Airline Reservation System 1.0 SQLi정보

제목itsourcecode Airline Reservation System 1.0 SQLi
설명On the /admin/login.php page, users enter their username and password for login verification. By capturing the request, it was found that the verification interface is /admin/ajax.php?action=login. By locating the method corresponding to the login action and analyzing it, it was discovered that in the admin/admin_class.php page, the filtering of the username and password fields is insufficient, leading to SQL injection vulnerabilities. The same issue also occurs in the login2() method. ————POC—————— Parameter: username (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: username=root' AND (SELECT 9673 FROM (SELECT(SLEEP(5)))bZXm) AND 'aMFp'='aMFp&password=Aa12345^
원천⚠️ https://github.com/DeepMountains/zzz/blob/main/CVE1-3.md
사용자
 quad (UID 73025)
제출2024. 08. 05. AM 10:03 (2 연령 ago)
모더레이션2024. 08. 05. PM 05:45 (8 hours later)
상태수락
VulDB 항목273624 [itsourcecode Airline Reservation System 1.0 Admin Login Page /admin/login.php login/login2 사용자 이름 SQL 주입]
포인트들20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!