Submit #299787: SOURCECODESTER Employee Task Management System 1.0 SQL Injectioninfo

TitleSOURCECODESTER Employee Task Management System 1.0 SQL Injection
DescriptionThe Employee Task Management System has an SQL Injection vulnerability in `/edit-task.php`. This vulnerability allows attackers to execute arbitrary SQL commands by manipulating the `task_id` parameter. The provided proof of concept demonstrates how an attacker could retrieve sensitive database information, including the database name, version, and user, by injecting a `union select` query. This issue underscores the importance of employing parameterized queries or prepared statements to protect against SQL Injection attacks, ensuring the integrity and security of the application's data.
Source⚠️ https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/SQL%20Injection%20-%20edit-task.php.md
Usernochizplz (ID 64302)
Submission2024-03-16 18:10 (2 months ago)
Moderation2024-03-17 09:11 (15 hours later)
StatusDuplicate
VulDB Entry221452

Do you want to use VulDB in your project?

Use the official API to access entries easily!