提交 #262671: kashipara Dynamic Lab Management System ≤1.0 SQL injection信息

标题kashipara Dynamic Lab Management System ≤1.0 SQL injection
描述SQL injection vulnerability exists in admin_password parameter of /admin/admin_login_process.php file of Dynamic Lab Management System Important user data or system data may be leaked and system security may be compromised The environment is secure and the information can be used by malicious users. Payload: admin_password=0' AND (SELECT 9477 FROM (SELECT(SLEEP(5)))TMtz) AND 'NwGl'='NwGl&admin_username=1
来源⚠️ https://github.com/E1CHO/cve_hub/blob/main/Dynamic%20Lab%20Management%20System%20-%20vuln%201.pdf
用户
 SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (UID 38936)
提交2024-01-05 07時32分 (2 年前)
管理2024-01-07 21時07分 (3 days later)
状态已接受
VulDB条目249873 [Kashipara Dynamic Lab Management System 直到 1.0 admin_login_process.php admin_password SQL注入]
积分20

Want to know what is going to be exploited?

We predict KEV entries!