-
Notifications
You must be signed in to change notification settings - Fork 57
Open
Description
I discovered a SQL Injection vulnerability in the login functionality. Currently, user input is passed directly into the SQL query without parameterization or proper sanitization, allowing an attacker to manipulate the query.
Proof of Concept (PoC):
- Go to the login form.
- Enter the following in the username field:
' OR '1'='1
and leave the password field blank (or any random value).
- The application grants access without valid credentials.
Impact:
- Bypass authentication without valid credentials.
- Access or modify sensitive user data in the database.
- Potential full database compromise.
Recommendation:
- Use prepared statements with parameter binding (mysqli_stmt_bind_param).
- Validate and sanitize all user inputs before using them in queries.
- Avoid concatenating user inputs directly into SQL statements.
Metadata
Metadata
Assignees
Labels
No labels