Submeter #441917: Code4Berry Decoration Management System 1.0 SQL Injectioninformação

TítuloCode4Berry Decoration Management System 1.0 SQL Injection
Descrição There is a SQL injection vulnerability at the /decoration/admin/btndates_report.php endpoint. You can filter the "Between Dates Reports" to focus on a range of dates by sending a POST request to this endpoint with the multipart/form-data syntax. You can find a SQLI vulnerability in the "fromdate" and "todate" parameters by sending a request like this: ------WebKitFormBoundarymSRx4RCtQnt9h30W Content-Disposition: form-data; name="fromdate" 2024-11-04 ------WebKitFormBoundarymSRx4RCtQnt9h30W Content-Disposition: form-data; name="todate" 2024-11-29'+(select*from(select(sleep(20)))a)+' ------WebKitFormBoundarymSRx4RCtQnt9h30W Also - this endpoint shouldn't be available to regular users but there is nothing preventing you from visiting it or sending the SQLI POST request, as long as you have a valid logged in session. Thanks for reading!!
Utilizador
 scumdestroy (UID 48934)
Submissão12/11/2024 04h48 (há 1 Ano)
Moderação20/11/2024 09h11 (8 days later)
EstadoAceite
Entrada VulDB285502 [Code4Berry Decoration Management System 1.0 Between Dates Reports btndates_report.php fromdate/todate Injeção SQL]
Pontos17

Do you know our Splunk app?

Download it now for free!