提出 #595346: SourceCodester Online-Funding-Management-System-PHP-Project 1.0 SQL Injection情報

タイトルSourceCodester Online-Funding-Management-System-PHP-Project 1.0 SQL Injection
説明A critical SQL injection vulnerability exists in the Online Funding Management System (v1.0) within the members/fundDetails.php page. The m06 GET parameter is susceptible to time-based blind SQL injection due to insufficient input sanitization, enabling attackers to inject malicious SQL code and enumerate database information, such as schema and table counts. The provided payload exploits MySQL’s SLEEP() function to induce a measurable response delay, confirming the vulnerability. This flaw risks unauthorized access to sensitive data, including user credentials and financial records. Vulnerability Details Type: SQL Injection Severity: Critical Affected Component: members/fundDetails.php Affected URL: http://localhost/management_system/members/fundDetails.php?m06=test'%20AND%20IF((SELECT%20COUNT(*)%20FROM%20information_schema.tables%20WHERE%20table_schema=DATABASE())%20%3E%2010,%20SLEEP(5),%200)%20AND%20'abc'%3D'abc Vulnerable Parameter: m06
ソース⚠️ https://gist.github.com/0xCaptainFahim/86a679533ca293c98be5ab91b76b213f
ユーザー
 0xCaptainFahim (UID 86447)
送信2025年06月11日 11:15 (10 月 ago)
モデレーション2025年06月19日 12:49 (8 days later)
ステータス承諾済み
VulDBエントリ313341 [SourceCodester Advance Charity Management System 1.0 /members/fundDetails.php m06 SQLインジェクション]
ポイント20

Do you want to use VulDB in your project?

Use the official API to access entries easily!