| 제목 | EMPLOYEE_MANAGEMENT_SYSTEM v1.0 SQL Injection |
|---|
| 설명 | ## EMPLOYEE_MANAGEMENT_SYSTEM file `370project/edit.php` contains a SQL Injection (time-based blind) vulnerability
Impact of the vulnerability
Because user-controlled input is concatenated into an SQL statement without proper parameterization, an attacker may be able to:
- Infer/extract data via blind techniques
- Bypass intended query logic and access unauthorized records (depending on DB privileges)
- Degrade service availability by triggering expensive/time-delay queries
### Payload:
(select*from(select+sleep(10)union/**/select+1)a)
### **Sources download:**
https://code-projects.org/employee-management-system-in-php-with-source-code/ |
|---|
| 원천 | ⚠️ https://github.com/zzzxc643/CVE1/blob/main/EMPLOYEE_MANAGEMENT_SYSTEM/vul3.md |
|---|
| 사용자 | SSL_Seven_Security_Lab_WangZhiQiang_ZhanXiuChen (UID 97200) |
|---|
| 제출 | 2026. 04. 09. AM 08:48 (19 날 ago) |
|---|
| 모더레이션 | 2026. 04. 26. PM 06:01 (17 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 359714 [code-projects Employee Management System 1.0 370project/edit.php 아이디 SQL 주입] |
|---|
| 포인트들 | 20 |
|---|