SQL injection vulnerability in House Rental System
In view property In PHP, from line 32 to line 34 of the code, property_ The ID is passed to the backend through get and assigned to the variable $property_ ID, and then executed the SQL statement query, and substituted it into the database. There is no single quotation mark protection, nor any filter function, and then returned mysqli_ Query Query Results
$property_id=$_GET['property_id'];
$sql="SELECT * from add_property where property_id='$property_id'";
$query=mysqli_query($db,$sql);
Build environment: Apache 2.4.39; MySQL5.7.26; PHP7.3.4
SQL injection vulnerability in House Rental System
In view property In PHP, from line 32 to line 34 of the code, property_ The ID is passed to the backend through get and assigned to the variable $property_ ID, and then executed the SQL statement query, and substituted it into the database. There is no single quotation mark protection, nor any filter function, and then returned mysqli_ Query Query Results
POC:
The text was updated successfully, but these errors were encountered: