vendor:
Content Management System using PHP/MySQLi with Source Code
by:
Zhayi (Zeo)
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Content Management System using PHP/MySQLi with Source Code
Affected Version From: Version 1
Affected Version To: Version 1
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:content_management_system_using_phpmysqli_source_code
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 10
2020
Content Management System 1.0 – ’email’ SQL Injection
An attacker can exploit a SQL injection vulnerability in Content Management System 1.0 by sending a maliciously crafted request to the 'http://127.0.0.1/ajax.php?action=login' page. This can be done by capturing the request of the page in Burp Suite, saving the POST packet, and running sqlmap on the request file using the command 'python3 sqlmap.py -r request.txt --random-agent --batch --dbms "mysql" --time-sec=5 --no-cast --dbs". This will inject successfully and allow for an information disclosure of all databases contents.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in an SQL query.