vendor:
Employee Task Management System
by:
Muhammad Navaid Zafar Ansari
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Employee Task Management System
Affected Version From: v 1.0
Affected Version To: v 1.0
Patch Exists: NO
Related CWE: CVE-2023-0904
CPE: a:sourcecodester:employee_task_management_system:1.0
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=83728, https://www.infosecmatter.com/nessus-plugin-library/?id=112128, https://www.infosecmatter.com/nessus-plugin-library/?id=125819, https://www.infosecmatter.com/nessus-plugin-library/?id=108286, https://www.infosecmatter.com/nessus-plugin-library/?id=140414, https://www.infosecmatter.com/nessus-plugin-library/?id=79962, https://www.infosecmatter.com/nessus-plugin-library/?id=111176, https://www.infosecmatter.com/nessus-plugin-library/?id=102146, https://www.infosecmatter.com/nessus-plugin-library/?id=31450, https://www.infosecmatter.com/nessus-plugin-library/?id=32424
Platforms Tested: Windows 11
2023
Employee Task Management System v1.0 – SQL Injection on (task-details.php?task_id=?)
The vulnerability exists in the task-details.php page, where the task_id parameter is vulnerable to SQL Injection attack. An attacker can inject malicious SQL code into the task_id parameter and execute it on the database, allowing them to access or modify sensitive data, or even take control of the entire system.
Mitigation:
To prevent SQL Injection attacks, developers should properly sanitize and validate all user input, and implement strong security measures, such as input validation, output encoding, parameterized queries, and access controls.