Отправить #99639: Sales Tracker Management System sql injectionИнформация

НазваниеSales Tracker Management System sql injection
ОписаниеA vulnerability classified as critical has been found in SourceCodester Sales Tracker Management System 1.0. Affected is an delete_client function of the file classes/Master.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The delete_client function received the parameter and there is no filtering operation for parameters. Directly compose sql statements for database operation. This causes sql injection. sourcecode download url: https://www.sourcecodester.com/php/16061/sales-tracker-management-system-using-php-free-source-code.html sqlmap data packet: POST /php-sts/classes/Master.php?f=delete_client HTTP/1.1 Host: 192.168.131.135 Content-Length: 4 Accept: application/json, text/javascript, */*; q=0.01 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/x.x.x.x Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Origin: http://192.168.131.135 Referer: http://192.168.131.135/php-sts/admin/?page=clients Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 Cookie: PHPSESSID=jdrpmrsek6p8ng9fmdh68bqmo0; deviceid=1678156846944; xinhu_mo_adminid=fv0eh0ff0li0vf0vh0lf0hhs0if0hhc0hci0hcl0vv0iv0vs0ei012; xinhu_ca_adminuser=admin; xinhu_ca_rempass=0 Connection: close id=3
Источник⚠️ https://github.com/Mart1nD0t/vul-test/blob/main/sts-3.md
Пользователь
 yangxuelin (UID 42489)
Представление09.03.2023 08:29 (3 лет назад)
Модерация09.03.2023 15:25 (7 hours later)
Статуспринято
Запись VulDB222646 [SourceCodester Sales Tracker Management System 1.0 classes/Master.php delete_client ИД SQL-инъекция]
Баллы20

Do you need the next level of professionalism?

Upgrade your account now!