提交 #782202: halex CourseSEL 1.1.0 SQL Injection信息

标题halex CourseSEL 1.1.0 SQL Injection
描述A SQL Injection vulnerability exists in the CourseSEL system (a ThinkPHP 3.2 based application) due to the lack of parameterization and improper input sanitization in the Apps/Index/Controller/IndexController.class.php file. The check_sel method directly concatenates the user-supplied HTTP GET parameter seid into the SQL query string using the framework's where() method. An authenticated attacker with standard student privileges can exploit this vulnerability to trigger an Error-based SQL Injection, allowing them to bypass authorization, extract sensitive database schemas, and dump administrative credentials.
来源⚠️ https://github.com/zy606/Vulnerability-Report/tree/main/CourseSEL-SQLi
用户
 Zyyyy (UID 96412)
提交2026-03-18 09時52分 (19 日前)
管理2026-04-04 08時42分 (17 days later)
状态已接受
VulDB条目355290 [halex CourseSEL 直到 1.1.0 HTTP GET Parameter IndexController.class.php check_sel seid SQL注入]
积分20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!