| Название | kashipara Dynamic Lab Management System ≤1.0 SQL injection |
|---|
| Описание | SQL injection vulnerability exists in admin_password parameter of /admin/admin_login_process.php file of Dynamic Lab Management System
Important user data or system data may be leaked and system security may be compromised
The environment is secure and the information can be used by malicious users.
Payload: admin_password=0' AND (SELECT 9477 FROM (SELECT(SLEEP(5)))TMtz) AND 'NwGl'='NwGl&admin_username=1 |
|---|
| Источник | ⚠️ https://github.com/E1CHO/cve_hub/blob/main/Dynamic%20Lab%20Management%20System%20-%20vuln%201.pdf |
|---|
| Пользователь | SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936) |
|---|
| Представление | 05.01.2024 07:32 (2 лет назад) |
|---|
| Модерация | 07.01.2024 21:07 (3 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 249873 [Kashipara Dynamic Lab Management System до 1.0 admin_login_process.php admin_password SQL-инъекция] |
|---|
| Баллы | 20 |
|---|