提出 #774341: code-projects Simple Food Ordering System in PHP 1.0 SQL Injection情報

タイトルcode-projects Simple Food Ordering System in PHP 1.0 SQL Injection
説明The Simple Food Ordering System in PHP is vulnerable to a Time-Based Blind SQL Injection through the status parameter in the all-tickets.php endpoint. The application fails to properly validate and sanitize user-supplied input before incorporating it into SQL queries. Because of this, an attacker can inject malicious SQL statements into the status parameter. By using time-delay functions such as SLEEP(), attackers can confirm the presence of SQL injection and potentially extract sensitive information from the backend database. The vulnerability can be triggered by sending a specially crafted HTTP request containing a time-based SQL payload. When the payload is processed by the application, the database executes the injected SLEEP() command, causing the server response to be delayed. This delay confirms that the SQL query is being executed without proper input validation. Successful exploitation of this vulnerability could allow attackers to enumerate the database structure, extract sensitive information, bypass authentication mechanisms, and manipulate database contents
ソース⚠️ https://github.com/ahmadmarz10-hub/CVEsMarz/blob/main/SQL%20Injection%20(Time-Based%20Blind)Simple%20Food%20Ordering%20System%20in%20PHP.md?plain=1
ユーザー
 AhmadMarzouk (UID 95993)
送信2026年03月07日 00:19 (2 月 ago)
モデレーション2026年03月21日 09:03 (14 days later)
ステータス承諾済み
VulDBエントリ352321 [code-projects Simple Food Ordering System 1.0 all-tickets.php ステータス SQLインジェクション]
ポイント20

Want to know what is going to be exploited?

We predict KEV entries!