Skicka in #335527: SourceCodester Online Examination System Project V1.0 SQL Injectioninformation

TitleSourceCodester Online Examination System Project V1.0 SQL Injection
Descriptionzebra11 discovered a significant security vulnerability in the Online Examination System Project, caused by inadequate protection of the "email" parameter in the "registeracc.php" file. This vulnerability could be exploited to inject malicious SQL queries, leading to unauthorized access and the extraction of sensitive information from the database. The method on line 22 of the "registeracc.php" file retrieves the value of the user input "email" from the POST element. Then the value of this element will be passed to the code without proper purification or validation, and ultimately used for database queries in the method on line 27 of the "registeracc.php" file. This may lead to SQL injection attacks.
Source⚠️ https://github.com/CveSecLook/cve/issues/32
User
 zebra11 (UID 68838)
Submission15/05/2024 18:51 (11 månader sedan)
Moderation17/05/2024 07:51 (2 days later)
StatusAccepterad
VulDB Entry264743 [SourceCodester Online Examination System 1.0 registeracc.php email sql injektion]
Points20

Do you need the next level of professionalism?

Upgrade your account now!