Submit #466519: codezips eCommerce 1.0 SQL Injectioninfo

Titlecodezips eCommerce 1.0 SQL Injection
DescriptionA SQL injection vulnerability was found in the '/login.php' file of the 'E-commerce Site Using PHP With Source Code' project: https://github.com/mohsinenur/E-Commerce-Website-Using-PHP Within the login.php file, the function "mysql_real_escape_string" is used to sanitize user inputs before embedding them into SQL queries. However, this method is does not provide sufficient protection against SQL injection attacks. The underlying SQL query writes: $result = mysql_query("SELECT * FROM user WHERE (email='$user_login') AND password='$password_login_md5' AND activation='yes'"); and allows an attacker to inject malicious SQL statements. For instance, by inputting " ' OR '1'='1 " in the email field, the query becomes: SELECT * FROM user WHERE (email='' OR '1'='1') AND password='' AND activation='yes';
Source⚠️ https://geochen.medium.com/sqli-in-login-php-of-e-commerce-website-using-php-1abacb5e2ccd
User
 geochen (UID 78995)
Submission12/19/2024 04:03 PM (3 months ago)
Moderation12/20/2024 11:35 PM (1 day later)
StatusAccepted
VulDB Entry289142 [Codezips E-Commerce Website 1.0 /login.php email sql injection]
Points17

Want to stay up to date on a daily basis?

Enable the mail alert feature now!