提交 #570957: ScriptAndTools Real Estate Management System 1.0 SQL Injection信息

标题ScriptAndTools Real Estate Management System 1.0 SQL Injection
描述Title of the Vulnerability: Script And Tools | Real Estate Management System 1.0 | SQL Injection Admin Bypass In /admin/ Vulnerability Class: SQL Injection Product Name: Real Estate Management System Vendor: https://github.com/scriptandtools/ Vulnerable Product Link: https://github.com/scriptandtools/Real-Estate-website-in-PHP Technical Details & Description: The application source code is coded in a way which allows To Access /admin/ via SQL Injection Admin Bypass Payloads! Product & Service Introduction: Real Estate Management System Observation & Exploitation: Here,The Vulnerable File Is: /admin/addpackage.php Lets Exploit ????????️????: Step-1: First,Go To The Vulnerable Location: Example: http://192.168.0.100:8080/reali/admin/ Step-2: Now use SQL Admin Bypass Payloads Like: ' or 1=1 limit 1 -- -+ use it in both username and password field! And you will be logged in the admin panel then! So,This indicates that the /admin/ is vulnerable to SQL Injection
来源⚠️ https://www.websecurityinsights.my.id/2025/05/script-and-tools-real-estate-management.html
用户
 MaloyRoyOrko (UID 79572)
提交2025-05-04 16時28分 (12 月前)
管理2025-05-23 20時17分 (19 days later)
状态已接受
VulDB条目310206 [ScriptAndTools Real-Estate-website-in-PHP 1.0 Admin Login Panel /admin/ 密码 SQL注入]
积分20

Might our Artificial Intelligence support you?

Check our Alexa App!