Submit #431781: code-projects Blood Bank Management System 1.0 SQL Injectioninfo

Titlecode-projects Blood Bank Management System 1.0 SQL Injection
DescriptionA time-based SQL Injection vulnerability was discovered in the delete request functionality of the BloodBank Management System version 1.0. This vulnerability occurs because the bid parameter is not properly sanitized, allowing an attacker to inject malicious SQL commands into the backend database query. This attack relies on a blind SQL injection technique, where the attacker uses time-based delays (via the BENCHMARK function) to infer if the injection was successful. If the system delays its response, the attacker knows the SQL query was executed, allowing them to: Tamper with or delete sensitive records (e.g., blood bank data). Extract data slowly by chaining multiple queries. Cause Denial of Service (DoS) by overloading the system with intensive queries.
Source⚠️ https://gist.github.com/higordiego/bf0cf963ec56cfe0dcaba2956352bafd
User
 c4ttr4ck (UID 75518)
Submission10/25/2024 11:15 PM (1 month ago)
Moderation10/26/2024 03:43 PM (16 hours later)
StatusAccepted
VulDB Entry281958 [code-projects Blood Bank Management System 1.0 /file/delete.php bid sql injection]
Points20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!