Soumettre #783502: Song-Li cross_browser ca690f0fe6954fd9bcda36d071b68ed8682a786a SQL Injectioninformation

TitreSong-Li cross_browser ca690f0fe6954fd9bcda36d071b68ed8682a786a SQL Injection
DescriptionThe legacy MySQL-backed Flask application in cross_browser contains an SQL injection vulnerability in the /details endpoint implemented in flask/uniquemachine_app.py. The handler reads ID from a JSON request body and directly concatenates it into a SQL SELECT statement without parameterization or escaping. An attacker who can reach this endpoint can submit crafted input to alter the SQL query and retrieve unintended database records, and in some MySQL deployment configurations may be able to perform broader data exfiltration or blind SQL injection techniques.
La source⚠️ https://github.com/wing3e/public_exp/issues/24
Utilisateur
 BigW (UID 96422)
Soumission20/03/2026 04:13 (il y a 18 jours)
Modérer04/04/2026 16:50 (15 days later)
StatutAccepté
Entrée VulDB355347 [Song-Li cross_browser details Endpoint uniquemachine_app.py ID injection SQL]
Points20

Might our Artificial Intelligence support you?

Check our Alexa App!