Submit #43762: There is a SQL injection vulnerability in the guest management system.info

TitleThere is a SQL injection vulnerability in the guest management system.
DescriptionThere is a SQL injection vulnerability in the visitor management system, which does not check the query content entered by the user. The input content is controllable by the user, and the user can construct a malicious payload to attack the website. Vulnerability file location: / guestmanagement / front.php look at this source code ``` if(isset($_GET['rid'])){ $showResultFor = $_ GET['rid']; } $query = "SELECT * FROM info_visitor WHERE ReceiptID = '$showResultFor' AND Status = 'ONLINE' "; ``` There is no protection for $rid here. Malicious data can be constructed here to attack the website database. The construction statement is as follows ``` ? rid=0' union select 1,database(),3,@@version,5,6,7,8,9,10,11,12,13,14,15,16--+ ``` https://s1.ax1x.com/2022/08/13/vtDZfe.png Source link https://www.sourcecodester.com/php/14664/guest-management-system-php-full-source-code.html
Source⚠️ https://www.sourcecodester.com/php/14664/guest-management-system-php-full-source-code.html/
Userqidian (ID 30810)
Submission16/08/2022 01:03 (2 years ago)
Moderation16/08/2022 15:56 (15 hours later)
StatusAccepterad
VulDB Entry206489

Do you know our Splunk app?

Download it now for free!