Отправить #570957: ScriptAndTools Real Estate Management System 1.0 SQL InjectionИнформация

НазваниеScriptAndTools Real Estate Management System 1.0 SQL Injection
ОписаниеTitle of the Vulnerability: Script And Tools | Real Estate Management System 1.0 | SQL Injection Admin Bypass In /admin/ Vulnerability Class: SQL Injection Product Name: Real Estate Management System Vendor: https://github.com/scriptandtools/ Vulnerable Product Link: https://github.com/scriptandtools/Real-Estate-website-in-PHP Technical Details & Description: The application source code is coded in a way which allows To Access /admin/ via SQL Injection Admin Bypass Payloads! Product & Service Introduction: Real Estate Management System Observation & Exploitation: Here,The Vulnerable File Is: /admin/addpackage.php Lets Exploit ????????️????: Step-1: First,Go To The Vulnerable Location: Example: http://192.168.0.100:8080/reali/admin/ Step-2: Now use SQL Admin Bypass Payloads Like: ' or 1=1 limit 1 -- -+ use it in both username and password field! And you will be logged in the admin panel then! So,This indicates that the /admin/ is vulnerable to SQL Injection
Источник⚠️ https://www.websecurityinsights.my.id/2025/05/script-and-tools-real-estate-management.html
Пользователь
 MaloyRoyOrko (UID 79572)
Представление04.05.2025 16:28 (12 месяцы назад)
Модерация23.05.2025 20:17 (19 days later)
Статуспринято
Запись VulDB310206 [ScriptAndTools Real-Estate-website-in-PHP 1.0 Admin Login Panel /admin/ Пароль SQL-инъекция]
Баллы20

Do you want to use VulDB in your project?

Use the official API to access entries easily!