# N/A
## 漏洞概述
CloudClassroom-PHP-Project v1.0 版本中存在 SQL 注入漏洞。该漏洞存在于注册表单(registrationform)端点的 `pass` 参数处,由于输入验证不足,允许攻击者注入恶意 SQL 查询。
## 影响版本
- CloudClassroom-PHP-Project v1.0
## 漏洞细节
`pass` 参数在 `registrationform` 端点中未进行适当的输入验证。攻击者可以通过操控这个参数来注入恶意的 SQL 查询。
## 影响
由于存在 SQL 注入漏洞,攻击者可以执行未经授权的数据库操作,从而获取、修改或删除敏感数据。
# | POC 描述 | 源链接 | 神龙链接 |
---|
标题: GitHub - mathurvishal/CloudClassroom-PHP-Project: The “Cloud Classroom” Website (web-based application) is useful for the students, faculty, guest whoever likes to learn from web using E-Learn (Videos), as well Check result, schedules of assessment and all that task like event, news, students can find out list of fresh courses offered by them and admission procedure, discussion forum, fee structure etc. without going to institute. It provides the facility to the students or guest to have complete information about the institute. In this application, the student can attend his\her missed classes from e-learn. -- 🔗来源链接
标签:
神龙速读标题: 🚨 CVE-2025-45542: Time-Based Blind SQL Injection in CloudClassroom PHP Project v1.0 ! | by Sanjay Singh | May, 2025 | Medium -- 🔗来源链接
标签:
神龙速读