إرسال #290516: sourcecodester Petrol pump management software 1.0 SQL Injectionالمعلومات

عنوانsourcecodester Petrol pump management software 1.0 SQL Injection
الوصفThe Petrol Pump Management Software available on SOURCECODESTER is vulnerable to an Unauthenticated SQL Injection attack through its /admin/edit_supplier.php endpoint. This security flaw is due to the application's improper handling and sanitization of user-supplied input in the id parameter. By exploiting this vulnerability, attackers can craft malicious SQL queries that the application will execute without validation. The provided proof of concept demonstrates how an attacker can use a UNION SELECT query to retrieve sensitive information from the database, such as data from the /etc/passwd file or the database version, by injecting into the id parameter. This type of vulnerability poses a significant risk as it can lead to unauthorized access to sensitive data, database manipulation, or even a complete system compromise. The addition of credits to Russel James Avenido alongside Joshua Lictan suggests a collaborative effort in identifying and reporting this critical vulnerability. It underscores the need for rigorous input validation, the use of prepared statements, and proper authentication mechanisms to protect web applications from SQL Injection attacks.
المصدر⚠️ https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_supplier.php%20SQL%20Injection.md
المستخدم
 nochizplz (UID 64302)
ارسال29/02/2024 05:26 AM (2 سنوات منذ)
الاعتدال01/03/2024 07:54 AM (1 day later)
الحالةتمت الموافقة
إدخال VulDB255376 [SourceCodester Petrol Pump Management Software 1.0 /admin/edit_supplier.php معرف حقن SQL]
النقاط20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!