SQL Injection Vulnerability Found By Maloy Roy Orko to In The Admin Panel Of Library-Card-System 1.0(Vendor: Needyamin).The Admin Panel (admin.php) Can Be Bypassed Via SQL Injection Admin Bypass Payloads Which Makes The Backend Login Checking Condition True And Let Us Login Without Correct Credentials.

Vulnerable Product Link: https://github.com/needyamin/Library-Card-System/

Vendor Link:
https://github.com/needyamin/

Vendor: needyamin

Product Name: Library-Card-System

Type: Library-Card-System
😕😕😕😕😕


Title of the Vulnerability: Library-Card-System | SQL Injection Admin Login Bypass In admin.php | Found By Maloy Roy Orko

Finder & Exploit Owner: Maloy Roy Orko

Vulnerability Class: SQL Injection

Product Name: Library-Card-System 

Affected Components: /admin.php

Suggested Description:

SQL Injection in "admin.php" in "Library-Card-System application By needyamin v 1.0" Found By "Maloy Roy Orko" allows "remote" attacker "to bypass admin login check & login into admin panel as no validations are provided" via "admin.php".

Attack Vectors:

To exploit vulnerability,he has to put SQL Injection Admin Bypass Payloads in /admin.php.Thus, Attacker can gain access to Admin Panel ! 

Detailed Blog:

https://www.websecurityinsights.my.id/2025/01/library-card-system-admin-login-bypass.html?m=1