# PHPGurukul公司访客管理系统登录index.php SQL注入漏洞
## 概述
在PHPGurukul Company Visitor Management System 2.0版本中发现了一个漏洞,并被分类为严重漏洞。此漏洞影响了Sign In组件中未知功能的index.php文件。
## 影响版本
- PHPGurukul Company Visitor Management System 2.0
## 细节
通过操纵参数`username`,可以导致SQL注入攻击。该攻击可以通过远程方式发动。而且,该漏洞的利用细节已经公开披露。
## 影响
此漏洞可能导致远程SQL注入攻击,攻击者可以远程利用此漏洞获取敏感信息或控制管理系统。
                                        
                                    
                                | # | POC 描述 | 源链接 | 神龙链接 | 
|---|---|---|---|
| 1 | Company Visitor Management System 1.0 contains a SQL injection vulnerability via the login page in the username parameter. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-2473.yaml | POC详情 | 
标题: Company Visitors Management System using PHP and MySQL SQL Injection vulnerability in /index.php · Issue #2 · l8BL/vul_report -- 🔗来源链接
标签: exploit issue-tracking
标题: PHP Project, PHP Projects Ideas, PHP Latest tutorials, PHP oops Concept -- 🔗来源链接
标签: product
标题: Login required -- 🔗来源链接
标签: signature permissions-required
标题: CVE-2025-2473 PHPGurukul Company Visitor Management System Sign In index.php sql injection -- 🔗来源链接
标签: vdb-entry technical-description
标题: Submit #517266: PHPGurukul Company Visitors Management System using PHP and MySQL V2.0 SQL Injection -- 🔗来源链接
标签: third-party-advisory
暂无评论