提交 #287648: keerti1924 PHP-MYSQL-User-Login-System 1.0 SQL Injection信息

标题keerti1924 PHP-MYSQL-User-Login-System 1.0 SQL Injection
描述A SQL injection vulnerability was discovered in the login.php script of the PHP-MYSQL-User-Login-System developed by keerti1924. By injecting malicious SQL code via the 'email' parameter, attackers can bypass authentication and gain unauthorized access to the application. The flaw allows for the execution of a UNION SELECT statement, enabling retrieval of sensitive data. Notably, successful exploitation requires the 'password' parameter to match the hash of the injected password, exacerbating the risk of unauthorized access.
来源⚠️ https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20PHP-MYSQL-User-Login-System/SQLI%20Auth.md
用户
 nochizplz (UID 64302)
提交2024-02-25 07時00分 (2 年前)
管理2024-03-07 15時34分 (11 days later)
状态已接受
VulDB条目256034 [keerti1924 PHP-MYSQL-User-Login-System 1.0 /login.php email SQL注入]
积分20

Want to know what is going to be exploited?

We predict KEV entries!