Submit #352337: SourceCodester Stock Management System in PHP V1.0 SQL Injectioninfo

TitleSourceCodester Stock Management System in PHP V1.0 SQL Injection
DescriptionDuring the security review of the "Stock Management System," xuanluansec discovered a critical SQL injection vulnerability in the index.php file. This vulnerability stems from inadequate validation of user inputs for the username and password parameters, allowing attackers to inject malicious SQL queries. As a result, attackers can gain unauthorized access to the database, modify or delete data, and access sensitive information. Immediate remediation is required to secure the system and protect data integrity. A SQL injection vulnerability was found in the index.php file of the Stock Management System project. This issue arises because user inputs $username and $password from $_POST['username'] and $_POST['password'] are directly used in SQL queries without proper sanitization or validation. This allows attackers to craft input values that can manipulate the SQL query and execute unauthorized operations.
Source⚠️ https://github.com/CveSecLook/cve/issues/43
User
 xuanluansec (UID 68581)
Submission06/08/2024 06:25 AM (1 Year ago)
Moderation06/08/2024 09:48 AM (3 hours later)
StatusAccepted
VulDB Entry267457 [SourceCodester Stock Management System 1.0 Login index.php username/password sql injection]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!