提出 #667107: projectworlds Advanced Library Management System 1 SQL Injection情報

タイトルprojectworlds Advanced Library Management System 1 SQL Injection
説明The view_member.php endpoint in Advanced Library Management System (V1.0) is vulnerable to SQL injection via the user_id GET parameter (boolean/time-based/UNION). It is exploitable without authentication, allowing attackers to enumerate and exfiltrate database contents or modify data. Immediate mitigations: apply WAF/rate-limiting and reduce DB privileges; permanent fix: validate inputs and use parameterized queries (prepared statements) and output-encode responses.
ソース⚠️ https://github.com/ChenGuangHuangHun/CVE/issues/4
ユーザー
 chenguang (UID 91178)
送信2025年10月02日 04:55 (7 月 ago)
モデレーション2025年10月08日 06:58 (6 days later)
ステータス承諾済み
VulDBエントリ327593 [projectworlds Advanced Library Management System 1.0 /view_member.php user_id SQLインジェクション]
ポイント20

Do you need the next level of professionalism?

Upgrade your account now!