exploit is now possible
This commit is contained in:
@@ -95,7 +95,7 @@ async def login_form():
|
|||||||
@app.post("/login")
|
@app.post("/login")
|
||||||
async def login(login: str = Form(...), password: str = Form(...)):
|
async def login(login: str = Form(...), password: str = Form(...)):
|
||||||
cursor.execute(
|
cursor.execute(
|
||||||
f"SELECT * FROM users WHERE login='{login}' AND password='{password}'"
|
f"SELECT login FROM users WHERE login='{login}' AND password='{password}'"
|
||||||
)
|
)
|
||||||
user = cursor.fetchall()
|
user = cursor.fetchall()
|
||||||
if user:
|
if user:
|
||||||
@@ -124,8 +124,10 @@ async def welcome(request: Request):
|
|||||||
password = request.cookies.get("password")
|
password = request.cookies.get("password")
|
||||||
if not login or not password:
|
if not login or not password:
|
||||||
return RedirectResponse(url="/login")
|
return RedirectResponse(url="/login")
|
||||||
|
query=f"SELECT login FROM users WHERE login='{login}' AND password='{password}'"
|
||||||
|
print(f"executing: {query}")
|
||||||
cursor.execute(
|
cursor.execute(
|
||||||
f"SELECT login FROM users WHERE login='{login}' AND password='{password}'"
|
query
|
||||||
)
|
)
|
||||||
user = cursor.fetchall()
|
user = cursor.fetchall()
|
||||||
if user:
|
if user:
|
||||||
@@ -133,7 +135,7 @@ async def welcome(request: Request):
|
|||||||
<html>
|
<html>
|
||||||
<head><title>Добро пожаловать</title>{STYLES}</head>
|
<head><title>Добро пожаловать</title>{STYLES}</head>
|
||||||
<body>
|
<body>
|
||||||
<h1>Привет, {user}</h1>
|
<h1>Привет, {str(user)[3:-4]}</h1>
|
||||||
<button onclick="
|
<button onclick="
|
||||||
document.cookie = 'login=; expires=Thu, 01 Jan 1970 00:00:00 UTC; path=/;';
|
document.cookie = 'login=; expires=Thu, 01 Jan 1970 00:00:00 UTC; path=/;';
|
||||||
document.cookie = 'password=; expires=Thu, 01 Jan 1970 00:00:00 UTC; path=/;';
|
document.cookie = 'password=; expires=Thu, 01 Jan 1970 00:00:00 UTC; path=/;';
|
||||||
|
|||||||
Reference in New Issue
Block a user