Soumettre #782202: halex CourseSEL 1.1.0 SQL Injectioninformation

Titrehalex CourseSEL 1.1.0 SQL Injection
DescriptionA SQL Injection vulnerability exists in the CourseSEL system (a ThinkPHP 3.2 based application) due to the lack of parameterization and improper input sanitization in the Apps/Index/Controller/IndexController.class.php file. The check_sel method directly concatenates the user-supplied HTTP GET parameter seid into the SQL query string using the framework's where() method. An authenticated attacker with standard student privileges can exploit this vulnerability to trigger an Error-based SQL Injection, allowing them to bypass authorization, extract sensitive database schemas, and dump administrative credentials.
La source⚠️ https://github.com/zy606/Vulnerability-Report/tree/main/CourseSEL-SQLi
Utilisateur
 Zyyyy (UID 96412)
Soumission18/03/2026 09:52 (il y a 21 jours)
Modérer04/04/2026 08:42 (17 days later)
StatutAccepté
Entrée VulDB355290 [halex CourseSEL jusqu’à 1.1.0 HTTP GET Parameter IndexController.class.php check_sel seid injection SQL]
Points20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!