Vulnerable-Web-Application/SQL/sql3.php
2018-11-29 23:13:17 +06:00

54 lines
1.3 KiB
PHP

<!DOCTYPE html>
<html>
<head>
<title>SQL Injection</title>
<link rel="shortcut icon" href="../Resources/hmbct.png" />
</head>
<body>
<form action="<?php $_SERVER['PHP_SELF']; ?>" method="post" >
<p>Give me book's number and I give you book's name in my library.</p>
Book's number : <input type="text" name="number">
<input type="submit" name="submit">
<!-- <p>//Is this same with the level 2?</p>-->
</form>
<?php
$servername = "localhost";
$username = "root";
$password = "";
$db = "1ccb8097d0e9ce9f154608be60224c7c";
// Create connection
$conn = new mysqli($servername, $username, $password,$db);
// Check connection
if ($conn->connect_error) {
die("Connection failed: " . $conn->connect_error);
}
//echo "Connected successfully";
if(isset($_POST["submit"])){
$number = $_POST['number'];
$query = "SELECT bookname,authorname FROM books WHERE number = '$number'"; //Is this same with the level 2?
$result = mysqli_query($conn,$query);
if (!$result) { //Check result
$message = 'Invalid query: ' . mysql_error() . "\n";
$message .= 'Whole query: ' . $query;
die($message);
}
while ($row = mysqli_fetch_assoc($result)) {
echo "<hr>";
echo $row['bookname']." ----> ".$row['authorname'];
}
if(mysqli_num_rows($result) <= 0)
echo "0 result";
}
?>
</body>
</html>