You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A SQL Injection vulnerability was identified in the endpoint /WeGIA/html/funcionario/remuneracao.php, in the id_funcionario parameter. This vulnerability allows the execution of arbitrary SQL commands, which can compromise the confidentiality, integrity, and availability of stored data.
Exfiltration of confidential data.
Database compromise.
Potential Denial of Service (DoS) through time-delay queries.
Recommendations:
Implement parameterized queries (Prepared Statements) to prevent SQL Injection.
Validate user inputs to accept only expected values.
Restrict database permissions for the application user to minimize the impact of exploitation.
POC
Normal Request:
SQL Injection
The text was updated successfully, but these errors were encountered:
Description:
A SQL Injection vulnerability was identified in the endpoint /WeGIA/html/funcionario/remuneracao.php, in the id_funcionario parameter. This vulnerability allows the execution of arbitrary SQL commands, which can compromise the confidentiality, integrity, and availability of stored data.
Vulnerable Request:
Payload
AND (SELECT 7525 FROM (SELECT(SLEEP(20)))PXhT)
Impact:
Exfiltration of confidential data.
Database compromise.
Potential Denial of Service (DoS) through time-delay queries.
Recommendations:
Implement parameterized queries (Prepared Statements) to prevent SQL Injection.
Validate user inputs to accept only expected values.
Restrict database permissions for the application user to minimize the impact of exploitation.
POC
Normal Request:
SQL Injection
The text was updated successfully, but these errors were encountered: