Skip to content

Latest commit

 

History

History
18 lines (11 loc) · 1002 Bytes

sts-3.md

File metadata and controls

18 lines (11 loc) · 1002 Bytes

Download sourcecode from https://www.sourcecodester.com/php/16061/sales-tracker-management-system-using-php-free-source-code.html Deploy the system The sql injection url: http://192.168.131.135/php-sts/classes/Master.php?f=delete_client  Vulnerability trigger parameter: id sourcecode: sts3-11

The delete_client function received the parameter and there is no filtering operation for parameters. Directly compose sql statements for database operation. This causes sql injection.

sts3-1

sqlmap: sqlmap.py -r c:\tmp\sts-1.txt -p id --risk 2 --dbs

sts3-2

sts3-3