Download as rtf, pdf, or txt
Download as rtf, pdf, or txt
You are on page 1of 2

Vulnerability Name:

Description:

1. SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere
with the queries that an application makes to its database.

2. It generally allows an attacker to view data that they are not normally able to retrieve.
This might include data belonging to other users, or any other data that the application
itself is able to access.

3. In many cases, an attacker can modify or delete this data, causing persistent changes
to the application's content or behavior.

Affected Resources/URL: http://www.embryohotel.com/room-detail.php?id=1

Parameter: id

Impact:

4. A successful SQL injection attack can result in unauthorized access to sensitive data,
such as passwords, credit card details, or personal user information.

5. Many high-profile data breaches in recent years have been the result of SQL injection
attacks, leading to reputational damage and regulatory fines.

6. In some cases, an attacker can obtain a persistent backdoor into an organization's


systems, leading to a long-term compromise that can go unnoticed for an extended
period

Recommondation:

· Most instances of SQL injection can be prevented by using parameterized queries (also
known as prepared statements) instead of string concatenation within the query.

Tools Used: Havij

References:

https://portswigger.net/web-security/sql-injection
POC:

Database Related Details:


Target: http://www.embryohotel.com/room-detail.php?id=1
Host IP: 163.44.198.59
Web Server: Apache
Powered-by: PHP/5.6.40
DB Server: MySQL >=5
Current User: cp227754_pyxis@localhost
Sql Version: 5.6.51
Current DB: cp227754_embryohotel_db
System User: cp227754_pyxis@localhost
Host Name: cpanel10wh.bkk1.cloud.z.com
Installation dir: /usr/
DB User: 'cp227754_pyxis'@'localhost'
Data Bases: information_schema
cp227754_embryohotel_db

You might also like