Submeter #287648: keerti1924 PHP-MYSQL-User-Login-System 1.0 SQL Injectioninformação

Títulokeerti1924 PHP-MYSQL-User-Login-System 1.0 SQL Injection
DescriçãoA SQL injection vulnerability was discovered in the login.php script of the PHP-MYSQL-User-Login-System developed by keerti1924. By injecting malicious SQL code via the 'email' parameter, attackers can bypass authentication and gain unauthorized access to the application. The flaw allows for the execution of a UNION SELECT statement, enabling retrieval of sensitive data. Notably, successful exploitation requires the 'password' parameter to match the hash of the injected password, exacerbating the risk of unauthorized access.
Fonte⚠️ https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20PHP-MYSQL-User-Login-System/SQLI%20Auth.md
Utilizador
 nochizplz (UID 64302)
Submissão25/02/2024 07h00 (há 2 anos)
Moderação07/03/2024 15h34 (11 days later)
EstadoAceite
Entrada VulDB256034 [keerti1924 PHP-MYSQL-User-Login-System 1.0 /login.php email Injeção SQL]
Pontos20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!