Needyamin | Library-Card-System 1.0 | card.php?id= SQL Injection | Found By Maloy Roy Orko
Library-Card-System 1.0 存在 SQL 注入漏洞,在 `card.php?id=` 参数处未受保护,允许远程攻击者通过输入恶意参数dump数据库。 2025-2-27 17:30:37 Author: cxsecurity.com(查看原文) 阅读量:6 收藏

Title of the Vulnerability: Needyamin | Library-Card-System 1.0 | card.php?id= SQL Injection | Found By Maloy Roy Orko Finder & Exploit Owner: Maloy Roy Orko Vulnerability Class: SQL Injection Product Name: Library-Card-System Vendor: needyamin Vendor Link: https://github.com/needyamin/ Vulnerable Product Link: https://github.com/needyamin/Library-Card-System/ Affected Components: ID Parameters Suggested Description: SQL Injection in "id parameter" in "Library-Card-System By needyamin v 1.0" allows "remote" attacker "to dump database as this isn't protected" via "card.php?id=" Attack Vectors: To exploit vulnerability,he has to input exploits via parameters and then he can dump whole database. Detailed Blog: https://www.websecurityinsights.my.id/2025/02/needyamin-library-card-system-10.html

References:

https://www.websecurityinsights.my.id/2025/02/needyamin-library-card-system-10.html




 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2025020017
如有侵权请联系:admin#unsafe.sh