.. / CVE-2022-40032

Exploit for Simple Task Managing System v1.0 - SQL Injection (CVE-2022-40032)

Description:

SQL injection occurs when a web application doesn’t properly validate or sanitize user input that is used in SQL queries. Attackers can exploit this by injecting malicious SQL code into the input fields of a web application, tricking the application into executing unintended database queries.

Nuclei Template

View the template here CVE-2022-40032.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-40032.yaml
Copy

References:

https://www.sourcecodester.com/php/15624/simple-task-managing-system-php-mysqli-free-source-code.html
https://nvd.nist.gov/vuln/detail/CVE-2022-40032
http://packetstormsecurity.com/files/171739/Simple-Task-Managing-System-1.0-SQL-Injection.html
https://www.exploit-db.com/exploits/51273
https://www.sourcecodester.com/sites/default/files/download/razormist/Task%20Managing%20System%20in%20PHP.zip