제출 #290516: sourcecodester Petrol pump management software 1.0 SQL Injection정보

제목sourcecodester Petrol pump management software 1.0 SQL Injection
설명The Petrol Pump Management Software available on SOURCECODESTER is vulnerable to an Unauthenticated SQL Injection attack through its /admin/edit_supplier.php endpoint. This security flaw is due to the application's improper handling and sanitization of user-supplied input in the id parameter. By exploiting this vulnerability, attackers can craft malicious SQL queries that the application will execute without validation. The provided proof of concept demonstrates how an attacker can use a UNION SELECT query to retrieve sensitive information from the database, such as data from the /etc/passwd file or the database version, by injecting into the id parameter. This type of vulnerability poses a significant risk as it can lead to unauthorized access to sensitive data, database manipulation, or even a complete system compromise. The addition of credits to Russel James Avenido alongside Joshua Lictan suggests a collaborative effort in identifying and reporting this critical vulnerability. It underscores the need for rigorous input validation, the use of prepared statements, and proper authentication mechanisms to protect web applications from SQL Injection attacks.
원천⚠️ https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_supplier.php%20SQL%20Injection.md
사용자
 nochizplz (UID 64302)
제출2024. 02. 29. AM 05:26 (2 연령 ago)
모더레이션2024. 03. 01. AM 07:54 (1 day later)
상태수락
VulDB 항목255376 [SourceCodester Petrol Pump Management Software 1.0 /admin/edit_supplier.php 아이디 SQL 주입]
포인트들20

Do you know our Splunk app?

Download it now for free!