Online Book Shop Using PHP has SQL Injection vulnerability via $usernm paremeter in /process_login.php
.
https://code-projects.org/online-book-shop-using-php-source-code/
/process_login.php - $usernm
paremeter.
The SQL Injection vulnerability exists in diretory /process_login.php
where this function query the usernm parameter into the SQL statement without any restriction, validation or sanitization. An attacker could exploit this vulnerability to get unauthorized access to the server database, or even perform Remote Code Execution (RCE).
$unm=$_POST['usernm'];
$q="select * from user where u_unm='$unm'";
$res=mysqli_query($conn,$q) or die("wrong query");
$row=mysqli_fetch_assoc($res);