vendor:
Library System
by:
Aitor Herrero
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Library System
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:library_system:1.0
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 10 + XAMPP 7.4.4
2021
Library System 1.0 – ‘category’ SQL Injection
Library System 1.0 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the application. To exploit this vulnerability, an attacker can send a malicious SQL query to the application via the 'category' parameter. For example, an attacker can send a malicious SQL query to the application via the URL http://localhost:8080/libsystem/libsystem/index.php?category=3 and then run sqlmap to exploit the vulnerability.
Mitigation:
Developers should use parameterized queries to prevent SQL injection attacks. Input validation should also be used to ensure that only valid data is accepted by the application.