제출 #570957: ScriptAndTools Real Estate Management System 1.0 SQL Injection정보

제목ScriptAndTools Real Estate Management System 1.0 SQL Injection
설명Title of the Vulnerability: Script And Tools | Real Estate Management System 1.0 | SQL Injection Admin Bypass In /admin/ Vulnerability Class: SQL Injection Product Name: Real Estate Management System Vendor: https://github.com/scriptandtools/ Vulnerable Product Link: https://github.com/scriptandtools/Real-Estate-website-in-PHP Technical Details & Description: The application source code is coded in a way which allows To Access /admin/ via SQL Injection Admin Bypass Payloads! Product & Service Introduction: Real Estate Management System Observation & Exploitation: Here,The Vulnerable File Is: /admin/addpackage.php Lets Exploit ????????️????: Step-1: First,Go To The Vulnerable Location: Example: http://192.168.0.100:8080/reali/admin/ Step-2: Now use SQL Admin Bypass Payloads Like: ' or 1=1 limit 1 -- -+ use it in both username and password field! And you will be logged in the admin panel then! So,This indicates that the /admin/ is vulnerable to SQL Injection
원천⚠️ https://www.websecurityinsights.my.id/2025/05/script-and-tools-real-estate-management.html
사용자
 MaloyRoyOrko (UID 79572)
제출2025. 05. 04. PM 04:28 (12 개월 ago)
모더레이션2025. 05. 23. PM 08:17 (19 days later)
상태수락
VulDB 항목310206 [ScriptAndTools Real-Estate-website-in-PHP 1.0 Admin Login Panel /admin/ 비밀번호 SQL 주입]
포인트들20

Do you need the next level of professionalism?

Upgrade your account now!