In the recently discovered security vulnerability in Blood Bank v1.0, the lack of proper input validation and sanitization on certain parameters has exposed the database to potential SQL injection attacks. This loophole allows attackers to bypass authentication mechanisms and gain unauthorized access to sensitive information.
The vulnerable parameters in question are ‘hemail’ and ‘hpassword’ in the hospitalLogin.php file, as well as ‘remail’ and ‘rpassword’ in the receiverLogin.php file. By crafting SQL injection queries, malicious actors can exploit these parameters to extract data from the database.
Ersin Erenler, the security researcher who identified this issue, noted that the exploit can be executed by using tools like sqlmap. By injecting malicious code into the vulnerable parameters, attackers can manipulate the database and retrieve sensitive information.
For instance, an attacker could use sqlmap to target the ‘hemail’ parameter in hospitalLogin.php and execute a boolean-based blind SQL injection attack. This would allow them to retrieve the current database information and potentially escalate their unauthorized access.
Similarly, the ‘remail’ and ‘rpassword’ parameters in the receiverLogin.php file are also susceptible to SQL injection attacks. By exploiting these vulnerabilities, attackers could gain unauthorized access to the database and compromise sensitive data.
In response to these vulnerabilities, it is crucial for the vendor to implement proper input validation and sanitization measures to prevent SQL injection attacks. It is recommended that users update to a patched version of the software that addresses these security issues.
The CVE identifiers associated with these vulnerabilities are CVE-2023-46014, CVE-2023-46017, and CVE-2023-46018. These identifiers serve as a reference for security researchers and software developers to track and address the specific vulnerabilities in question.
As cyber threats continue to evolve, it is essential for software vendors to prioritize security and proactively address vulnerabilities to protect user data and maintain the integrity of their systems. By taking proactive measures to secure their applications, vendors can mitigate the risk of malicious attacks and safeguard the privacy and security of their users’ information.