An attacker can inject SQL queries, run arbitrary PHP code, or obtain sensitive information by using the id parameter as an access token. The updated version of Garage Management System v1.0 released on February 1, 2018, fixes this vulnerability. Users are encouraged to upgrade to the latest version as soon as possible.

It was also discovered that Garage Management System v1.0 contained multiple SQL injection vulnerabilities. The following are just some of the vulnerabilities discovered in this version. The updated version of this package released on February 1, 2018, fixes all of these issues. Users are encouraged to upgrade to the latest version as soon as possible. ?= $query = " SELECT * FROM users WHERE email = '{$_POST['email']}' "; ?> ?= $query = " UPDATE users SET password = '{$_POST['password']}' "; ?> ?= $query = " INSERT INTO users (email, password) VALUES ('{$_POST['email']}','{$_POST['password']}') "; ?> ?= $query = " DELETE FROM users WHERE email = '{$_POST['email']}' "; ?> ?= $query = " UNION ALL SELECT 1, 'foo' "; ?> ?= $query = " UNION ALL SELECT 1, 'bar' "; ?> ?= $query = " UPDATE

Operation Scenario

The vulnerability classifies as a remote code execution vulnerability whereby an attacker can inject SQL queries, run arbitrary PHP code, or obtain sensitive information by using the id parameter as an access token. The updated version of Garage Management System v1.0 released on February 1, 2018, fixes this vulnerability. Users are encouraged to upgrade to the latest version as soon as possible.

Timeline

Published on: 09/02/2022 05:15:00 UTC
Last modified on: 09/02/2022 21:49:00 UTC

References