Title | SOURCECODESTER Employee Task Management System 1.0 SQL Injection |
---|
Description | The Employee Task Management System has an SQL Injection vulnerability in `/edit-task.php`. This vulnerability allows attackers to execute arbitrary SQL commands by manipulating the `task_id` parameter. The provided proof of concept demonstrates how an attacker could retrieve sensitive database information, including the database name, version, and user, by injecting a `union select` query. This issue underscores the importance of employing parameterized queries or prepared statements to protect against SQL Injection attacks, ensuring the integrity and security of the application's data. |
---|
Source | ⚠️ https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/SQL%20Injection%20-%20edit-task.php.md |
---|
User | nochizplz (ID 64302) |
---|
Submission | 2024-03-16 18:10 (2 months ago) |
---|
Moderation | 2024-03-17 09:11 (15 hours later) |
---|
Status | Duplicate |
---|
VulDB Entry | 221452 |
---|