![]() ![]() ![]() Step-3: Now, the Server target accepted our payload and the response got delayed by 5 seconds. In this we used time-based blind payload: /orrs/?page=reserve&sid=1') AND (SELECT 6842 FROM (SELECT(SLEEP(5)))UsWr) AND ('WBCm'='WBCm ![]() Step-2: Put the SQL Injection payloads in 'id' field. Indian Railway Catering and Tourism Corporation (IRCTC) is a wholly owned subsidiary of the Indian Railways, Ministry of Railways, Government of India. Step-1: Navigate to 'Schedule' > go to 'Book' or 'Revervation Form' page using the following URL: Security Module- Security Modules provide security functions such as user management and device-level password control. Online Railway Reservation System v1.0 is vulnerable to SQL injection via the 'id' parameter on the Reservation Form.Īn attacker can compromise the database of the application using some automated(or manual) tools like SQLmap. SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to it's database. Change Mirror Download # Exploit Title: Online Railway Reservation System 1.0 - 'id' SQL Injection (Unauthenticated) The online railway ticket reservation system is developed using ASP with C as the backend in the. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |