| ଶୀର୍ଷକ | Sanitization Management System - SQL Injection leads to Unauthorized Admin Access |
|---|
| ବର୍ଣ୍ଣନା | # Exploit Title: Sanitization Management System - SQL Injection leads to Unauthorized Admin Access
# Exploit Author: Naveen Bhambhani
# Vendor Name: oretnom23
# Vendor Homepage: https://www.sourcecodester.com/php/15023/stock-management-system-phpoop-source-code.html
# Software Link: https://www.sourcecodester.com/php/15023/stock-management-system-phpoop-source-code.html
# Version: v1.0
# Tested on: Windows 11
Description:-
An SQL injection issue in Sanitization Management System v.1.0 allows an attacker to logged into admin account.
`
Payload used:-
admin' or 1=1--
`
Parameter:-
Username and Password
`
Steps to reproduce:-
1. First go the admin login
2. From there in username and password put the payload
Payload:
admin' or 1=1
3. Now press enter and we get logged in into admin account |
|---|
| ଉପଭୋକ୍ତା | nhsb (UID 38025) |
|---|
| ଦାଖଲ | 12/24/2022 08:33 AM (3 ବର୍ଷ ବର୍ଷ ago) |
|---|
| ମଧ୍ୟମ ଧରଣର | 12/24/2022 08:41 AM (8 minutes later) |
|---|
| ସ୍ଥିତି | ଗ୍ରହଣ କରାଯାଇଛି |
|---|
| VulDB ଏଣ୍ଟ୍ରି | 216739 [SourceCodester Sanitization Management System 1.0 Admin Login username/password SQL ଇଞ୍ଜେକ୍ସନ] |
|---|
| ପଏଣ୍ଟ | 17 |
|---|