You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jan 27, 2022. It is now read-only.
We found several SQLi vulnerabilities in stock-management-system.
Details:
The user input $data is used to construct the SQL queries in file routes/ApiRoutes.php. The application code validates the user input $data with a few validation functions (e.g., security()) in file helpers/ValidateParams.php. The validation functions also invoke a few sanitizers such as htmlspecialchars(). However, these sanitizations and validations are not efficient to prevent SQLi attacks because they still allow sensitive characters ("\") to be injected into SQL statements. Therefore, the SQL statements are unsafe and the attackers can exploit several SQLi vulnerabilities to compromise this application.
Patches:
We suggest adding mysqli_escape_string() sanitizers inside the validation functions to fix the vulnerabilities.
The text was updated successfully, but these errors were encountered:
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
We found several SQLi vulnerabilities in stock-management-system.
Details:
The user input $data is used to construct the SQL queries in file routes/ApiRoutes.php. The application code validates the user input $data with a few validation functions (e.g., security()) in file helpers/ValidateParams.php. The validation functions also invoke a few sanitizers such as htmlspecialchars(). However, these sanitizations and validations are not efficient to prevent SQLi attacks because they still allow sensitive characters ("\") to be injected into SQL statements. Therefore, the SQL statements are unsafe and the attackers can exploit several SQLi vulnerabilities to compromise this application.
Patches:
We suggest adding mysqli_escape_string() sanitizers inside the validation functions to fix the vulnerabilities.
The text was updated successfully, but these errors were encountered: