Отправить #786302: code-projects Online Application System For Admission In PHP 1.0 SQL InjectionИнформация

Названиеcode-projects Online Application System For Admission In PHP 1.0 SQL Injection
ОписаниеA SQL Injection vulnerability exists in the Online Application System for Admission in PHP within the admission form processing functionality. The vulnerability occurs in the following endpoint: /OnlineApplicationSystem_PHP/enrollment/admsnform.php The application processes numerous parameters submitted through an HTTP POST request during the admission process. One of these parameters, detid, is user-controlled and is used by the backend application without proper input validation or sanitization. Testing confirmed that the detid parameter is vulnerable to time-based SQL injection, indicating that attacker-supplied SQL expressions are interpreted and executed by the database engine. In the provided request, the attacker injects a delay-based SQL payload using the SLEEP() function: detid='+(select*from(select(sleep(20)))a)+' When this request is processed by the application, the server response is delayed by approximately 20 seconds, confirming that the injected SQL query is executed by the database. This demonstrates that the application directly incorporates user input into SQL queries without using prepared statements or parameterized queries. Because the parameter is not properly sanitized, attackers can manipulate the SQL query structure and execute arbitrary SQL commands.
Источник⚠️ https://github.com/ahmadmarz10-hub/CVEsMarz/blob/main/SQL%20Injection%20in%20Online%20Application%20System%20for%20Admission%20PHP%20detid%20Parameter.md
Пользователь
 AhmadMarzouk (UID 95993)
Представление23.03.2026 17:59 (16 дни назад)
Модерация05.04.2026 22:46 (13 days later)
Статуспринято
Запись VulDB355437 [code-projects Online Application System for Admission 1.0 Endpoint admsnform.php SQL-инъекция]
Баллы20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!