| 标题 | code-projects Real Estate Property ManagementSystem v1.0 php SQL Injection |
|---|
| 描述 | In search.php. An unrestricted SOL injection attack exists in an Real Estate Property Management System. Theparameters that can be controlled are as follows: $stateName parameter . This function executesthe id parameter into the SOL statement without any restrictions. A malicious attacker couldexploit this vulnerability to obtain sensitive information in the server database. |
|---|
| 来源 | ⚠️ https://github.com/1337g/realestatepropertymanagement_poc/blob/main/sql-gu2.pdf |
|---|
| 用户 | 1337gu (UID 80869) |
|---|
| 提交 | 2025-02-12 18時13分 (1 年前) |
|---|
| 管理 | 2025-02-16 15時17分 (4 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 295983 [code-projects Real Estate Property Management System 1.0 /search.php StateName/CityName/AreaName/CatId SQL注入] |
|---|
| 积分 | 20 |
|---|