vendor:
Music Gallery Site
by:
Muhammad Navaid Zafar Ansari
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Music Gallery Site
Affected Version From: v 1.0
Affected Version To: v 1.0
Patch Exists: NO
Related CWE: CVE-2023-0962
CPE: a:sourcecodester:music_gallery_site:1.0
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=134870, https://www.infosecmatter.com/nessus-plugin-library/?id=135464, https://www.infosecmatter.com/nessus-plugin-library/?id=134862, https://www.infosecmatter.com/nessus-plugin-library/?id=103064, https://www.infosecmatter.com/nessus-plugin-library/?id=147467, https://www.infosecmatter.com/nessus-plugin-library/?id=11943, https://www.infosecmatter.com/nessus-plugin-library/?id=99004, https://www.infosecmatter.com/nessus-plugin-library/?id=36807, https://www.infosecmatter.com/nessus-plugin-library/?id=15241, https://www.infosecmatter.com/nessus-plugin-library/?id=134614
Platforms Tested: Windows 11
2023
Music Gallery Site v1.0 – SQL Injection on page Master.php
The Music Gallery site does have public pages for music library. Whenever someone click on play button any music the popup will appear on the page and the URL of the page will be like this: php-music/classes/Master.php?f=get_music_details&id=*. The parameter 'id' is vulnerable to SQL Injection attack. An attacker can inject malicious SQL queries into the parameter and can gain access to the database.
Mitigation:
To prevent SQL Injection attacks, developers should properly sanitize and validate all user input, and implement strong security measures, such as input validation, output encoding, parameterized queries, and access controls.