vendor:
Voting System using PHP/MySQLi
by:
Syed Sheeraz Ali
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Voting System using PHP/MySQLi
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:voting_system_using_php/mysqli
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 10 20H2 + XAMPP v3.2.4
2021
Voting System 1.0 – Time based SQLI (Unauthenticated SQL injection)
If we try to login as a voter and catch the login request in burp then pass it to sql map then we can put our payload in voter parameter. The vulnerable code is located in the login.php file and the vulnerable parameter is the voter parameter which is passed unsanitized input.
Mitigation:
Input validation should be done on the server side to prevent SQL injection attacks.