From ee0bd3f7716546f679bd390d7b681fedf949b2fb Mon Sep 17 00:00:00 2001 From: Marcin Zelent Date: Wed, 30 May 2018 18:27:51 +0200 Subject: Added buffer overflow example --- examples/sql-injection/index.html | 25 +++++++++++++++++++++++++ examples/sql-injection/login.php | 23 +++++++++++++++++++++++ examples/sql-injection/users.db | Bin 0 -> 8192 bytes 3 files changed, 48 insertions(+) create mode 100644 examples/sql-injection/index.html create mode 100644 examples/sql-injection/login.php create mode 100644 examples/sql-injection/users.db (limited to 'examples/sql-injection') diff --git a/examples/sql-injection/index.html b/examples/sql-injection/index.html new file mode 100644 index 0000000..d3e760b --- /dev/null +++ b/examples/sql-injection/index.html @@ -0,0 +1,25 @@ + + + + Login page + + + + +

Login

+
+
+
+ +
+ + diff --git a/examples/sql-injection/login.php b/examples/sql-injection/login.php new file mode 100644 index 0000000..826c38c --- /dev/null +++ b/examples/sql-injection/login.php @@ -0,0 +1,23 @@ +open('users.db'); + } + } + + if(isset($_POST['email'], $_POST['pass'])) + { + $email = $_POST['email']; + $pass = $_POST['pass']; + + $db = new MyDB(); + + $sql = 'SELECT * FROM Users WHERE email=\''.$email.'\' AND password=\''.$pass.'\''; + + $ret = $db->query($sql); + while($row = $ret->fetchArray(SQLITE3_ASSOC)) { + echo 'Logged in as '.$row['email'].'
'; + } + $db->close(); + } +?> diff --git a/examples/sql-injection/users.db b/examples/sql-injection/users.db new file mode 100644 index 0000000..9ddf64e Binary files /dev/null and b/examples/sql-injection/users.db differ -- cgit v1.2.3