Title | code-projects Blood Bank Management System 1.0 SQL Injection |
---|
Description | A time-based SQL Injection vulnerability was discovered in the delete request functionality of the BloodBank Management System version 1.0. This vulnerability occurs because the bid parameter is not properly sanitized, allowing an attacker to inject malicious SQL commands into the backend database query.
This attack relies on a blind SQL injection technique, where the attacker uses time-based delays (via the BENCHMARK function) to infer if the injection was successful. If the system delays its response, the attacker knows the SQL query was executed, allowing them to:
Tamper with or delete sensitive records (e.g., blood bank data).
Extract data slowly by chaining multiple queries.
Cause Denial of Service (DoS) by overloading the system with intensive queries. |
---|
Source | ⚠️ https://gist.github.com/higordiego/bf0cf963ec56cfe0dcaba2956352bafd |
---|
User | c4ttr4ck (UID 75518) |
---|
Submission | 10/25/2024 11:15 PM (1 month ago) |
---|
Moderation | 10/26/2024 03:43 PM (16 hours later) |
---|
Status | Accepted |
---|
VulDB Entry | 281958 [code-projects Blood Bank Management System 1.0 /file/delete.php bid sql injection] |
---|
Points | 20 |
---|