Injection-Vulnerability-In-Pharmacy-Management-System-1.0
In the 19th line of login_core.php, the input email is directly brought into the Sql query statement without filtering, resulting in a Sql injection attack.
The user used by my database is root@localhost
Sql blind injection attack is used here, and the delay is 4 seconds at this time. If the if () judgment is correct, it will be delayed for 9 seconds

Judge that the second character is o. So we can always judge that the database user() is root@localhost
payload: ?email=admin@admin.com'+and+if(substr(user(),1,1)='r',SLEEP(5),null)--'&password=admin1&role=admins

