Submit #425283: code-projects Pharmacy Management System 1.0 SQL Injectioninfo

Titlecode-projects Pharmacy Management System 1.0 SQL Injection
DescriptionA critical SQL injection vulnerability was identified in the Pharmacy Management System version 1.0, specifically in the supplier validation functionality when checking if a supplier is active (is_active). This flaw arises from improper sanitization of the name parameter, which is sent via a GET request to the endpoint /php/add_new_purchase.php?action=is_supplier. An attacker can exploit this flaw to inject and execute arbitrary SQL commands, compromising the security and integrity of the system's database. This vulnerability poses a significant risk, as it can expose sensitive supplier information and disrupt operations by manipulating purchase flows. With no available patch, this flaw remains critical, requiring immediate attention to prevent data leaks, unauthorized access, or operational disruptions.
Source⚠️ https://gist.github.com/higordiego/26694ace59cbc1e1f8366bef96953569
User
 c4ttr4ck (UID 75518)
Submission10/16/2024 11:36 PM (9 months ago)
Moderation10/18/2024 06:21 PM (2 days later)
StatusAccepted
VulDB Entry280926 [code-projects Pharmacy Management System 1.0 add_new_purchase.php?action=is_supplier Name sql injection]
Points20

Do you know our Splunk app?

Download it now for free!