| Title | itsourcecode Web-Based-Internet-Laboratory-Management-System 1 Time-Based Blind SQL Injection in login.php |
|---|
| Description | A time-based blind SQL injection vulnerability exists in the login.php page of the ILUMS project. The user_email parameter is directly concatenated into an SQL query without sanitization or parameter binding.
This flaw allows attackers to perform time-based inference attacks to extract database content, including usernames and password hashes, ultimately leading to full compromise of authentication credentials. |
|---|
| Source | ⚠️ https://github.com/drew-byte/Web-Based-Internet-Laboratory-Management-System_SQLi-PoC/blob/main/README.md |
|---|
| User | drewbyte (UID 89075) |
|---|
| Submission | 09/06/2025 10:53 (8 months ago) |
|---|
| Moderation | 09/17/2025 08:35 (11 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 324616 [itsourcecode Web-Based Internet Laboratory Management System 1.0 login.php User::AuthenticateUser user_email sql injection] |
|---|
| Points | 20 |
|---|