| tiêu đề | EMPLOYEE_MANAGEMENT_SYSTEM v1.0 SQL Injection |
|---|
| Mô tả | ## EMPLOYEE_MANAGEMENT_SYSTEM file `370project/mark.php` contains a SQL Injection (time-based blind) vulnerability and improper input validation
Impact of the vulnerability
The application accepts attacker-controlled POST parameters and uses them in SQL statements without parameterization. This may allow an attacker to:
- Manipulate database queries/updates (unauthorized modification depending on DB permissions)
- Infer database behavior/data using blind techniques (e.g., time delays)
- Trigger runtime warnings/errors (information disclosure about file paths/line numbers; reduced stability)
### Payload:
(select*from(select+sleep(5)union/**/select+1)a)
### Sources download:
https://code-projects.org/employee-management-system-in-php-with-source-code/ |
|---|
| Nguồn | ⚠️ https://github.com/zzzxc643/CVE1/blob/main/EMPLOYEE_MANAGEMENT_SYSTEM/vul10.md |
|---|
| Người dùng | SSL_Seven_Security_Lab_WangZhiQiang_ZhanXiuChen (UID 97200) |
|---|
| Đệ trình | 09/04/2026 10:16 (cách đây 19 ngày) |
|---|
| Kiểm duyệt | 26/04/2026 18:02 (17 days later) |
|---|
| Trạng thái | Bản sao |
|---|
| Mục VulDB | 314498 [Campcodes Employee Management System 1.0 /mark.php ID Tiêm SQL] |
|---|
| điểm | 0 |
|---|