Submeter #786302: code-projects Online Application System For Admission In PHP 1.0 SQL Injectioninformação

Títulocode-projects Online Application System For Admission In PHP 1.0 SQL Injection
DescriçãoA SQL Injection vulnerability exists in the Online Application System for Admission in PHP within the admission form processing functionality. The vulnerability occurs in the following endpoint: /OnlineApplicationSystem_PHP/enrollment/admsnform.php The application processes numerous parameters submitted through an HTTP POST request during the admission process. One of these parameters, detid, is user-controlled and is used by the backend application without proper input validation or sanitization. Testing confirmed that the detid parameter is vulnerable to time-based SQL injection, indicating that attacker-supplied SQL expressions are interpreted and executed by the database engine. In the provided request, the attacker injects a delay-based SQL payload using the SLEEP() function: detid='+(select*from(select(sleep(20)))a)+' When this request is processed by the application, the server response is delayed by approximately 20 seconds, confirming that the injected SQL query is executed by the database. This demonstrates that the application directly incorporates user input into SQL queries without using prepared statements or parameterized queries. Because the parameter is not properly sanitized, attackers can manipulate the SQL query structure and execute arbitrary SQL commands.
Fonte⚠️ https://github.com/ahmadmarz10-hub/CVEsMarz/blob/main/SQL%20Injection%20in%20Online%20Application%20System%20for%20Admission%20PHP%20detid%20Parameter.md
Utilizador
 AhmadMarzouk (UID 95993)
Submissão23/03/2026 17h59 (há 15 dias)
Moderação05/04/2026 22h46 (13 days later)
EstadoAceite
Entrada VulDB355437 [code-projects Online Application System for Admission 1.0 Endpoint admsnform.php Injeção SQL]
Pontos20

Do you want to use VulDB in your project?

Use the official API to access entries easily!