/labvantage/rc?command=page&page=SampleList&_iframename=list
param1
SQL Injection is a critical security vulnerability that occurs when an application includes user-supplied data in SQL queries without proper validation or escaping. This flaw allows attackers to manipulate the SQL query and execute arbitrary SQL code, potentially gaining unauthorized access to the database, exfiltrating data, or modifying database contents.
In the Labvantage LIMS product, the SQL injection vulnerability was found in the param1
parameter of the POST request to the endpoint /labvantage/rc?command=page&page=SampleList&_iframename=list
.
The following steps were used to identify and confirm the SQL injection vulnerability in the param1
parameter of the POST request to the affected endpoint. The testing was conducted using Burp Suite.
param1
set to a regular integer value 97822
.Figure 1: When we put in param1=97822
, the size of the response is shown.
param1
was modified to include an SQL injection payload: param1=97822')+OR+('1'='1
.