| Kura | code-projects Blood Bank Management System 1.0 SQL Injection |
|---|
| Gaskiya | A SQL Injection vulnerability has been identified in the BloodBank Management System version 1.0, specifically in the cancel request functionality. This flaw arises from a lack of proper input sanitization on the reqid parameter, enabling malicious users to inject SQL commands into the query handling cancellation requests.
The vulnerability allows for a time-based blind SQL injection attack. In this scenario, an attacker injects code that makes the system execute time-intensive SQL operations, such as using the BENCHMARK function, to delay the response. If the request is valid, the system delays by a predefined amount of time, confirming that the injection worked. This technique can lead to:
Exfiltration of sensitive data over time.
Denial of Service (DoS) by slowing down the system.
Tampering with blood request statuses, including unauthorized cancellations.
|
|---|
| Manga | ⚠️ https://gist.github.com/higordiego/18cf04067697c8ceb2cba68980139dcc |
|---|
| Màdùmga | c4ttr4ck (UID 75518) |
|---|
| Furta | 10/25/2024 21:53 (1 Shettima 전) |
|---|
| Gargajiya | 10/26/2024 15:43 (18 hours later) |
|---|
| Halitta | Shingilam |
|---|
| VulDB gite | 281957 [code-projects Blood Bank Management System 1.0 /file/cancel.php reqid SQL Injection] |
|---|
| Nganji | 20 |
|---|