████████ SQL
High
U
U.S. Dept Of Defense
Submitted None
Actions:
Reported by
manshum12
Vulnerability Details
Technical details and impact analysis
hi , i think i find a SQL in https://██████████/
POST /requestaccount.php? HTTP/1.1
Host: █████
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0) Gecko/20100101 Firefox/60.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: https://█████████/requestaccount.php?
Content-Type: application/x-www-form-urlencoded
Content-Length: 98
Cookie: _ga=GA1.2.797825707.1531527624; PHPSESSID=h46aobnksi6rqe0dki7b34thn10qqf7j; TS0136a92d=0141bba1871c30b60b2555c9145e093817841b5f20a39085c1ff77e556280571aa32dcc2ebf57d0d397334f8207e32f1153478dbc7; Hm_lvt_dde6ba2851f3db0ddc415ce0f895822e=1531606739; Hm_lpvt_dde6ba2851f3db0ddc415ce0f895822e=1531623251
Connection: close
Upgrade-Insecure-Requests: 1
fname=&lname=&uname=&email=&phone=&dsn=&cmdName=&title=&rank=&rate=Not+specified&message=&curID=-1
SQL vulnerable in curID=-1'
if you puy ' u will see screenshot 49 and 48
## Impact
SQL injection is a code injection technique, used to attack data-driven applications, in which nefarious SQL statements are inserted into an entry field for execution
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
SQL Injection