제출 #782202: halex CourseSEL 1.1.0 SQL Injection정보

제목halex CourseSEL 1.1.0 SQL Injection
설명A SQL Injection vulnerability exists in the CourseSEL system (a ThinkPHP 3.2 based application) due to the lack of parameterization and improper input sanitization in the Apps/Index/Controller/IndexController.class.php file. The check_sel method directly concatenates the user-supplied HTTP GET parameter seid into the SQL query string using the framework's where() method. An authenticated attacker with standard student privileges can exploit this vulnerability to trigger an Error-based SQL Injection, allowing them to bypass authorization, extract sensitive database schemas, and dump administrative credentials.
원천⚠️ https://github.com/zy606/Vulnerability-Report/tree/main/CourseSEL-SQLi
사용자
 Zyyyy (UID 96412)
제출2026. 03. 18. AM 09:52 (19 날 ago)
모더레이션2026. 04. 04. AM 08:42 (17 days later)
상태수락
VulDB 항목355290 [halex CourseSEL 까지 1.1.0 HTTP GET Parameter IndexController.class.php check_sel seid SQL 주입]
포인트들20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!