Submeter #791820: ProjectsAndPrograms school-management-system commit 6b6fae5 SQL Injectioninformação

TítuloProjectsAndPrograms school-management-system commit 6b6fae5 SQL Injection
DescriçãoA critical SQL Injection vulnerability exists in the buslocation.php file within the student_panel directory of the School Management System. The application fails to properly sanitize or parameterize user-supplied input before using it in a database query. Specifically, on line 54 of student_panel/buslocation.php, the bus_id HTTP GET parameter is directly concatenated into the SQL statement: $sql = "SELECT * FROM bus_root WHERE bus_id='{$_GET['bus_id']}'"; This is a high-severity vulnerability. Successful exploitation allows a remote attacker to bypass intended database query logic.
Fonte⚠️ https://tcn60zf28jhk.feishu.cn/wiki/MdHFw78Gmi1zbske8Ozc6XTjnIh?from=from_copylink
Utilizador
 EthX0_ (UID 96627)
Submissão28/03/2026 09h13 (há 24 dias)
Moderação19/04/2026 12h53 (22 days later)
EstadoAceite
Entrada VulDB358230 [ProjectsAndPrograms School Management System até 6b6fae5426044f89c08d0dd101c7fa71f9042a59 HTTP GET Parameter buslocation.php bus_id Injeção SQL]
Pontos20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!