| Kura | Report_Online-Banking-System web 1.0 SQL Injection |
|---|
| Gaskiya | Vulnerability Title:SQL Injection in Online Banking System Login Function
Vulnerability Details:
Multiple SQL injection vulnerabilities were identified in the customer and staff login interfaces of the Online Banking System. The vulnerabilities allow unauthenticated attackers to extract sensitive database information including user credentials, database structure, and other confidential data.
Affected Components:
Customer Login Page (/banking/index.php)
Staff Login Page (/banking/staff_login.php)
Proof of Concept:
Navigate to the login page
In username field, enter: 1' AND extractvalue(1,concat(0x7e,database()))--
System returns: XPATH syntax error: '~bnak_db'
Database name bnak_dbis successfully extracted
Impact:
Attackers can completely compromise the database containing customer financial information and administrative credentials.
Environment:
PHP-based web application
MySQL database
Reproducible in standard LAMP/Windows environments |
|---|
| Manga | ⚠️ https://github.com/Nianalb/Report_Online-Banking-System/blob/main/SQL.docx |
|---|
| Màdùmga | Nianalb (UID 91431) |
|---|
| Furta | 11/06/2025 15:29 (3 Wurɗi 전) |
|---|
| Gargajiya | 11/16/2025 21:24 (10 days later) |
|---|
| Halitta | Shingilam |
|---|
| VulDB gite | 332611 [g33kyrash Online-Banking-System har 12dbfa690e5af649fb72d2e5d3674e88d6743455 /index.php Sunankai SQL Injection] |
|---|
| Nganji | 20 |
|---|