On the page appointment. php, the input information is submitted to the appointment connect. php through the POST request. The follow-up code is displayed in the appointment connect PHP page, the 16th line of code - the 29th line of code, the information entered by the user is assigned to the corresponding variable, and then inserted into the database, and the program judges if mysqli_ If the query is executed successfully, the data is successfully inserted into the database.
The user login status is not verified, so CSRF vulnerability is caused
Build environment: Aapche2.4.39; MySQL5.7.26; PHP7.3.4
1.Vulnerability analysis
POC:
The POC clicks Send, and then a piece of information about the user's ace will be added to the database
In the docker list interface, we can also see that a new West Sydney user named ace has been added
The text was updated successfully, but these errors were encountered: