vendor:
Company's Recruitment Management System
by:
Yash Mahajan
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Company's Recruitment Management System
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE:
CPE: a:sourcecodester:company's_recruitment_management_system:1.0
Platforms Tested: Windows 10, XAMPP
2021
Company’s Recruitment Management System 1.0 – ‘Multiple’ SQL Injection (Unauthenticated)
A vulnerability exists in the Company's Recruitment Management System 1.0, which allows an unauthenticated attacker to bypass authentication and gain access to the system. This is achieved by entering a payload into the username field as ' or 1=1-- without double-quotes and typing anything into the password field. The vulnerable parameters are 'id' and 'username'. An attacker can also use SQLMap to retrieve tables from the database by using the command 'python sqlmap.py -u http://localhost/employment_application/?page=view_vacancy&id=1 --level=3 --risk=2 --banner --dbms=sqlite --tables'
Mitigation:
Ensure that user input is properly sanitized and validated before being used in SQL queries. Use parameterized queries to prevent SQL injection attacks.