| Título | EMPLOYEE_MANAGEMENT_SYSTEM v1.0 SQL Injection |
|---|
| Descrição | ## EMPLOYEE_MANAGEMENT_SYSTEM file `370project/approve.php` contains a SQL Injection (time-based blind) vulnerability
Impact of the vulnerability
The application directly concatenates user-supplied parameters into an SQL `UPDATE` statement without parameterization. An attacker may be able to:
- Manipulate the approval logic (unauthorized status changes, depending on DB behavior/permissions)
- Infer database behavior/data using blind techniques
- Cause performance degradation by triggering time-delay or expensive database operations
### Payload:
(select*from(select+sleep(5)union/**/select+1)a)
### Sources download:
https://code-projects.org/employee-management-system-in-php-with-source-code/ |
|---|
| Fonte | ⚠️ https://github.com/zzzxc643/CVE1/blob/main/EMPLOYEE_MANAGEMENT_SYSTEM/vul9.md |
|---|
| Utilizador | SSL_Seven_Security_Lab_WangZhiQiang_ZhanXiuChen (UID 97200) |
|---|
| Submissão | 09/04/2026 10h15 (há 19 dias) |
|---|
| Moderação | 26/04/2026 18h02 (17 days later) |
|---|
| Estado | Aceite |
|---|
| Entrada VulDB | 359717 [code-projects Employee Management System 1.0 370project/approve.php id/token Injeção SQL] |
|---|
| Pontos | 20 |
|---|