Testing

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam aliquet nibh quis rutrum ullamcorper. Quisque malesuada nec metus nec convallis. In nec metus nisl. Nam ornare eros in ipsum molestie, et condimentum enim lobortis. Vestibulum elementum fermentum dui a ultricies. Aenean ac hendrerit magna, vitae convallis nulla. Pellentesque quis neque et orci auctor ornare. Sed imperdiet ante a libero lacinia tristique. Nunc nec orci nec sapien mollis iaculis. Pellentesque lacinia tortor at eros eleifend viverra. Vestibulum sem magna, iaculis eget diam non, sollicitudin maximus enim. Phasellus eleifend pellentesque velit quis congue.

Description:

It is observed to application is
vulnerable to authentication bypass through sql injection technique.

 

Unsafe Coding POC:

Step 1:

Screenshot
add with comments

Figure comments :

Step 2:

Screenshot
add with comments

 

Figure comments :

 

Impact:

Following are the impact of SQL injection
flaw:

  • Impacts in bullets and numbering
  • Impact 1
  • Impact 2

Countermeasures:

SQL Injection vulnerability are very
common and number of techniques to prevent sql

 

Safe
CodingPOC :

 

Step 1:

Screenshot
add with comments

Figure comments :

Step 2:

Screenshot
add with comments

 

Figure
comments :

 

 

 

Reference:

www.hackdossier.com

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *