Skip to content

Blind SQL Injection to RCE in a PHP open source application

Notifications You must be signed in to change notification settings

Dirac231/CVE-2024-40498

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 

Repository files navigation

CVE-2024-40498

Affected Application

Description

The file register.php handles user registration. At line 117, the POST parameters "$address1" and $address2" are unsanitized, unlike the e-mail, names and number, this leads to a SQL injection during the evaluation of the VALUES() statement.

To exploit the vulnerability, send a POST request to the "register.php" file, adding a "address1" POST parameter with a SQL Injection payload that escapes the statement context. Alternatively, an attacker can use the "sqlmap" utility to exploit the issue automatically.

About

Blind SQL Injection to RCE in a PHP open source application

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published