Submeter #290516: sourcecodester Petrol pump management software 1.0 SQL Injectioninformação

Títulosourcecodester Petrol pump management software 1.0 SQL Injection
DescriçãoThe Petrol Pump Management Software available on SOURCECODESTER is vulnerable to an Unauthenticated SQL Injection attack through its /admin/edit_supplier.php endpoint. This security flaw is due to the application's improper handling and sanitization of user-supplied input in the id parameter. By exploiting this vulnerability, attackers can craft malicious SQL queries that the application will execute without validation. The provided proof of concept demonstrates how an attacker can use a UNION SELECT query to retrieve sensitive information from the database, such as data from the /etc/passwd file or the database version, by injecting into the id parameter. This type of vulnerability poses a significant risk as it can lead to unauthorized access to sensitive data, database manipulation, or even a complete system compromise. The addition of credits to Russel James Avenido alongside Joshua Lictan suggests a collaborative effort in identifying and reporting this critical vulnerability. It underscores the need for rigorous input validation, the use of prepared statements, and proper authentication mechanisms to protect web applications from SQL Injection attacks.
Fonte⚠️ https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_supplier.php%20SQL%20Injection.md
Utilizador
 nochizplz (UID 64302)
Submissão29/02/2024 05h26 (há 2 anos)
Moderação01/03/2024 07h54 (1 day later)
EstadoAceite
Entrada VulDB255376 [SourceCodester Petrol Pump Management Software 1.0 /admin/edit_supplier.php ID Injeção SQL]
Pontos20

Do you know our Splunk app?

Download it now for free!