vendor:
Pharmacy Point of Sale System
by:
Murat
9,8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Pharmacy Point of Sale System
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:pharmacy_point_of_sale_system
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 10
2021
Pharmacy Point of Sale System 1.0 – ‘Multiple’ SQL Injection (SQLi)
Pharmacy Point of Sale System v1.0 is vulnerable to multiple SQL injection attacks. An attacker can exploit this vulnerability by sending malicious requests to the application. For example, sending a request to view_product.php with an id parameter set to -1' will result in a SQL injection attack. Other vulnerable parameters include date_from, date_to, page, expiry_date, product_id, quantity, supplier_id, view_only, and id. An attacker can also exploit the save_stock action in Actions.php by sending a malicious POST request.
Mitigation:
Developers should ensure that user input is properly sanitized and validated before being used in SQL queries. Additionally, developers should use parameterized queries to prevent SQL injection attacks.