From c9ef101708d5e8ea3237c8553c7abd6a1886254e Mon Sep 17 00:00:00 2001 From: ShinDarth Date: Sun, 30 Mar 2014 13:06:09 +0200 Subject: [PATCH] Vulnerabilities explained in pages --- README.md | 6 ++---- books1.php | 17 +++++++++++++++++ database_struct.sql => database.sql | 0 login1.php | 17 +++++++++++++++++ login3.php | 17 +++++++++++++++++ 5 files changed, 53 insertions(+), 4 deletions(-) rename database_struct.sql => database.sql (100%) diff --git a/README.md b/README.md index f71c045..353d1bb 100644 --- a/README.md +++ b/README.md @@ -2,8 +2,6 @@ This is a demonstration about SQL-Injection for an universitary project, you can http://sqlidemo.altervista.org -- Legal login: admin Password: pwd1 +- All vulnerabilities are explained in vulnerable pages -- Vulnerable page login1.php can be violated by passing ' OR '1'='1 as password. - -- Vulnerable page books1.php can be used to get all user table content by passing ' UNION SELECT * FROM users WHERE '1'='1 as author. \ No newline at end of file +- Database content is available in 'database.sql' file \ No newline at end of file diff --git a/books1.php b/books1.php index 0a9dc2c..229f11e 100644 --- a/books1.php +++ b/books1.php @@ -148,6 +148,23 @@ +
+
+
+

Vulnerability:

+
+
+ +
+
+
+
+Pass ' UNION SELECT * FROM users WHERE '1'='1 as author to get all users data.
+            
+
+
+
+
+
+
+
+

Vulnerability:

+
+
+ +
+
+
+
+Pass 1' OR '1'='1 as password to get authenticated.
+            
+
+
+
+
+
+
+
+

Vulnerability:

+
+
+ +
+
+
+
+Pass 1 OR 1=1 as PIN to get authenticated.
+            
+
+
+
+