Headline
CVE-2023-1475: SourceCodester Canteen Management System createuser.php sql injection_@sec的博客-CSDN博客
A vulnerability, which was classified as critical, has been found in SourceCodester Canteen Management System 1.0. This issue affects the function query of the file createuser.php. The manipulation of the argument uemail leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223337 was assigned to this vulnerability.
@sec 于 2023-03-17 16:41:19 发布 6 收藏
版权声明:本文为博主原创文章,遵循 CC 4.0 BY-SA 版权协议,转载请附上原文出处链接和本声明。
SourceCodester Canteen Management System createuser.php sql injection
url: youthappam/php_action/createuser.php
Abstract:
Line 17 of createUser.php invokes a SQL query built with input that comes from an untrusted source. This call could allow an attacker to modify the statement’s meaning or to execute arbitrary SQL commands.
Explanation:
SQL injection errors occur when:
- Data enters a program from an untrusted source.
- The data is used to dynamically construct a SQL query.
In this case, the data is passed to query() in createUser.php on line 17.
Parameter: uemail (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload:
userName=111&upassword=11&uemail=11' AND (SELECT 6188 FROM (SELECT(SLEEP(5)))oFgn) AND 'RhiY'='RhiY
Download Code:
https://www.sourcecodester.com/php/15688/canteen-management-system-project-source-code-php.html