| Title | Friendly Island Pizza Website and Ordering System v1.0 /friendlyispizzawebsite/deleteorder.php GET parameter id exists SQL injection vulnerability |
|---|
| Description | An issue was discovered in Friendly Island Pizza Website and Ordering System v1.0.
There is a SQL injection that can directly issue instructions to the background database system via /friendlyispizzawebsite/deleteorder.php?id.
Payload1:id=1'
Payload2:id=1' and (select 1 from (select(sleep(5)))a)--
|
|---|
| Source | ⚠️ https://github.com/a-xsg/bug_report/blob/main/vendors/Skynidnine/Friendly%20Island%20Pizza%20Website%20and%20Ordering%20System/SQLi-1.md |
|---|
| User | a-xsg (UID 42619) |
|---|
| Submission | 03/09/2023 14:08 (3 years ago) |
|---|
| Moderation | 03/09/2023 22:31 (8 hours later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 222662 [SourceCodester Friendly Island Pizza Website and Ordering System 1.0 GET Parameter deleteorder.php ID sql injection] |
|---|
| Points | 17 |
|---|