-
Notifications
You must be signed in to change notification settings - Fork 0
Code-projects School Fees Payment System V1.0 /student.php SQL injection #16
Copy link
Copy link
Open
Description
Code-projects School Fees Payment System V1.0 /student.php SQL injection
NAME OF AFFECTED PRODUCT(S)
- School Fees Payment System
Vendor Homepage
AFFECTED AND/OR FIXED VERSION(S)
Submitter
- DS_Leo
Vulnerable File
- /student.php
VERSION(S)
- V1.0
Software Link
PROBLEM TYPE
Vulnerability Type
- SQL injection
Root Cause
- A SQL injection vulnerability was found in the '/student.php' file of the 'School Fees Payment System' project. The reason for this issue is that attackers inject malicious code from the parameter 'id' and use it directly in SQL queries without the need for appropriate cleaning or validation. This allows attackers to forge input values, thereby manipulating SQL queries and performing unauthorized operations.
Impact
- Attackers can exploit this SQL injection vulnerability to achieve unauthorized database access, sensitive data leakage, data tampering, comprehensive system control, and even service interruption, posing a serious threat to system security and business continuity.
DESCRIPTION
- During the security review of "School Fees Payment System",I discovered a critical SQL injection vulnerability in the "/student.php" file. This vulnerability stems from insufficient user input validation of the 'id' parameter, allowing attackers to inject malicious SQL queries. Therefore, attackers can gain unauthorized access to databases, modify or delete data, and access sensitive information. Immediate remedial measures are needed to ensure system security and protect data integrity.
NO LOGIN OR AUTHORIZATION IS REQUIRED TO EXPLOIT THIS VULNERABILITY
VULNERABILITY DETAILS AND POC
Vulnerability Location:
- 'id' parameter
Payload:
Parameter: id (GET)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: action=delete&id=13' AND (SELECT 2336 FROM (SELECT(SLEEP(5)))bjGy)-- JzXUPROOF OF CONCEPT
Source Code Tracing
- Within the file designated as "/student.php", the application assembles SQL statements by integrating user-supplied input, thereby enabling the potential execution of malevolent SQL statement payloads directly within the database.
Vulnerability Recurrence
sqlmap -u "http://192.168.184.133/student.php?action=delete&id=13" --level 5 --dbsReactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels

