| Title | Sales Tracker Management System sql injection |
|---|
| Description | A vulnerability classified as critical has been found in SourceCodester Sales Tracker Management System 1.0. Affected is an delete_client function of the file classes/Master.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely.
The delete_client function received the parameter and there is no filtering operation for parameters. Directly compose sql statements for database operation. This causes sql injection.
sourcecode download url: https://www.sourcecodester.com/php/16061/sales-tracker-management-system-using-php-free-source-code.html
sqlmap data packet:
POST /php-sts/classes/Master.php?f=delete_client HTTP/1.1
Host: 192.168.131.135
Content-Length: 4
Accept: application/json, text/javascript, */*; q=0.01
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/x.x.x.x Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Origin: http://192.168.131.135
Referer: http://192.168.131.135/php-sts/admin/?page=clients
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: PHPSESSID=jdrpmrsek6p8ng9fmdh68bqmo0; deviceid=1678156846944; xinhu_mo_adminid=fv0eh0ff0li0vf0vh0lf0hhs0if0hhc0hci0hcl0vv0iv0vs0ei012; xinhu_ca_adminuser=admin; xinhu_ca_rempass=0
Connection: close
id=3 |
|---|
| Source | ⚠️ https://github.com/Mart1nD0t/vul-test/blob/main/sts-3.md |
|---|
| User | yangxuelin (UID 42489) |
|---|
| Submission | 03/09/2023 08:29 (3 years ago) |
|---|
| Moderation | 03/09/2023 15:25 (7 hours later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 222646 [SourceCodester Sales Tracker Management System 1.0 classes/Master.php delete_client ID sql injection] |
|---|
| Points | 20 |
|---|