The id parameter in view_storage.php from Simple Cold Storage Management System 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
simple cold storage management system project simple cold storage managment system 1.0 |