| Titel | EMPLOYEE_MANAGEMENT_SYSTEM v1.0 SQL Injection |
|---|
| Beschreibung | ## EMPLOYEE_MANAGEMENT_SYSTEM file `370project/cancel.php` contains a SQL Injection (time-based blind) vulnerability
Impact of the vulnerability
User-controlled parameters are concatenated into an SQL `UPDATE` statement without parameterization. This may allow an attacker to:
- Manipulate leave-request status (unauthorized cancellation, depending on DB behavior/permissions)
- Infer database behavior/data via blind techniques
- Degrade availability by triggering time-delay or expensive database operations
### Payload:
(select*from(select+sleep(10)union/**/select+1)a)
### Sources download:
https://code-projects.org/employee-management-system-in-php-with-source-code/ |
|---|
| Quelle | ⚠️ https://github.com/zzzxc643/CVE1/blob/main/EMPLOYEE_MANAGEMENT_SYSTEM/vul11.md |
|---|
| Benutzer | SSL_Seven_Security_Lab_WangZhiQiang_ZhanXiuChen (UID 97200) |
|---|
| Einreichung | 09.04.2026 10:17 (vor 19 Tagen) |
|---|
| Moderieren | 26.04.2026 18:02 (17 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 359718 [code-projects Employee Management System 1.0 370project/cancel.php id/token SQL Injection] |
|---|
| Punkte | 20 |
|---|