Title | code-projects Blood Bank Management System 1.0 SQL Injection |
---|
Description | A SQL Injection vulnerability has been identified in the BloodBank Management System version 1.0, specifically in the cancel request functionality. This flaw arises from a lack of proper input sanitization on the reqid parameter, enabling malicious users to inject SQL commands into the query handling cancellation requests.
The vulnerability allows for a time-based blind SQL injection attack. In this scenario, an attacker injects code that makes the system execute time-intensive SQL operations, such as using the BENCHMARK function, to delay the response. If the request is valid, the system delays by a predefined amount of time, confirming that the injection worked. This technique can lead to:
Exfiltration of sensitive data over time.
Denial of Service (DoS) by slowing down the system.
Tampering with blood request statuses, including unauthorized cancellations.
|
---|
Source | ⚠️ https://gist.github.com/higordiego/18cf04067697c8ceb2cba68980139dcc |
---|
User | c4ttr4ck (UID 75518) |
---|
Submission | 10/25/2024 09:53 PM (2 months ago) |
---|
Moderation | 10/26/2024 03:43 PM (18 hours later) |
---|
Status | Accepted |
---|
VulDB Entry | 281957 [code-projects Blood Bank Management System 1.0 /file/cancel.php reqid sql injection] |
---|
Points | 20 |
---|