CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4DescriptionNVD
A vulnerability has been found in PHPGurukul Dairy Farm Shop Management System 1.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /sales-report-details.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AnalysisAI
PHPGurukul Dairy Farm Shop Management System version 1.3 contains a critical SQL injection vulnerability in the /sales-report-details.php file affecting the fromdate and todate parameters. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with working proof-of-concept code available, making active exploitation likely in the wild.
Technical ContextAI
The vulnerability is a classic SQL injection (CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component) in a PHP-based web application. The /sales-report-details.php endpoint fails to properly sanitize or parameterize user input from the 'fromdate' and 'todate' HTTP parameters before incorporating them into SQL queries. The affected product is PHPGurukul Dairy Farm Shop Management System (CPE approximation: cpe:2.3:a:phpgurukul:dairy_farm_shop_management_system:1.3:*:*:*:*:*:*:*). The root cause is insufficient input validation and lack of prepared statements or parameterized queries, allowing attackers to break out of intended SQL query context and inject malicious SQL syntax.
RemediationAI
patch: Check PHPGurukul official website or GitHub repository for version 1.4+ which may contain fixes; contact vendor directly for security updates workaround: Implement strict input validation on date parameters using whitelist patterns (YYYY-MM-DD format only); reject any input containing SQL metacharacters or unexpected syntax workaround: Use prepared statements/parameterized queries in /sales-report-details.php; refactor all date parameter handling to use bound parameters instead of string concatenation mitigation: Deploy Web Application Firewall (WAF) rules to block SQL injection payloads targeting date parameters; monitor for suspicious query patterns in application logs mitigation: Restrict database user privileges to read-only where possible; implement principle of least privilege for database connections used by this application mitigation: Consider disabling or restricting access to /sales-report-details.php until patching is available; limit access by IP address or require VPN authentication
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-16856