Soumettre #287777: keerti1924 Online-Book-Store-Website 1.0 SQL Injectioninformation

Titrekeerti1924 Online-Book-Store-Website 1.0 SQL Injection
DescriptionThe 'search.php' script in keerti1924's Online-Book-Store-Website is vulnerable to SQL Injection, allowing attackers to execute arbitrary SQL commands and gain unauthorized access to the underlying database. This could lead to unauthorized data disclosure, data manipulation, and potential data loss, compromising the confidentiality, integrity, and availability of the system and its data. By injecting a crafted payload into the 'search' parameter, an attacker can exploit this vulnerability to retrieve sensitive information from the database, such as version details. To mitigate this issue, developers should implement robust input validation and parameterized queries to sanitize user input and prevent SQL Injection attacks. Regular security assessments and code reviews are also recommended to detect and remediate such vulnerabilities in the application's codebase.
La source⚠️ https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/SQL%20Injection%20Search/SQL%20Injection%20in%20search.php%20.md
Utilisateur
 nochizplz (UID 64302)
Soumission25/02/2024 17:15 (il y a 2 ans)
Modérer07/03/2024 15:35 (11 days later)
StatutAccepté
Entrée VulDB256039 [keerti1924 Online-Book-Store-Website 1.0 /search.php Recherche injection SQL]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!