vendor:
Police Crime Record Management System
by:
Davide 't0rt3ll1n0' Taraschi
9
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Police Crime Record Management System
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux (Ubuntu 20.04)
2021
Crime records Management System 1.0 – ‘Multiple’ SQL Injection (Authenticated)
An authenticated user may be able to read data for which is not authorized, tamper with or destroy data, or possibly even read/write files or execute code on the database server. All four parameters passed via POST are vulnerable: `fname` is vulnerable both to boolean-based blind and time-based blind SQLi, `oname` is vulnerable both to boolean-based blind and time-based blind SQLi, `username` is only vulnerable to time-based blind SQLi, `status` is vulnerable both to boolean-based blind and time-based blind SQLi.
Mitigation:
Sanitize the variables via `mysql_real_escape_string()` before being passed to the prepared statement.