| 제목 | Ecommerce-Clothing-Website web 1 SQL Injection |
|---|
| 설명 | Ecommerce-Clothing-Website has an SQL injection vulnerability: In the /log.php file of the website, lines 69-79, the user input password (log_pass) is directly concatenated into the SQL query to fetch users without any filtering, resulting in an SQL injection vulnerability in the login functionality. By entering 'or'1'='1 in the password input box, the password verification can be bypassed to log in successfully. The project setup requires downloading the project from GitHub https://github.com/yousaf530/Ecommerce-Clothing-Website. |
|---|
| 원천 | ⚠️ https://github.com/mhszed/Report/blob/main/Ecommerce-Clothing-Website%20sql.docx |
|---|
| 사용자 | mahushuai (UID 91047) |
|---|
| 제출 | 2025. 09. 30. AM 04:02 (7 개월 ago) |
|---|
| 모더레이션 | 2025. 10. 12. AM 08:26 (12 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 328071 [yousaf530 Inferno Online Clothing Store 까지 827dd42bfbe380e8de76fdc67958c24cf1246208 /log.php cemail/password SQL 주입] |
|---|
| 포인트들 | 20 |
|---|