vendor:
Simple Student Attendance System
by:
Gnanaraj Mauviel
6.1
CVSS
HIGH
Time Based Blind SQL Injection
89
CWE
Product Name: Simple Student Attendance System
Affected Version From: v1.0
Affected Version To: v1.0
Patch Exists: NO
Related CWE:
CPE: a:oretnom23:simple_student_attendance_system:1.0
Platforms Tested: Mac OSX, XAMPP, Apache, MySQL
2023
Simple Student Attendance System – Time Based Blind SQL Injection
The Simple Student Attendance System v1.0 is vulnerable to a Time Based Blind SQL Injection. An attacker can exploit this vulnerability by sending a crafted POST request with a malicious payload to the 'id' parameter in the delete_student function of the actions.class.php file. This allows the attacker to perform unauthorized SQL queries, potentially leading to data leakage or manipulation. This exploit has been tested using sqlmap tool.
Mitigation:
To mitigate this vulnerability, input validation and parameterized queries should be implemented in the application to prevent SQL injection attacks. Additionally, limiting database user privileges and regular security testing can help protect against such exploits.