/labvantage/rc?command=page&page=SampleList&_iframename=listparam1SQL Injection is a critical security vulnerability that occurs when an application includes user-supplied data in SQL queries without proper validation or escaping. This flaw allows attackers to manipulate the SQL query and execute arbitrary SQL code, potentially gaining unauthorized access to the database, exfiltrating data, or modifying database contents.
In the Labvantage LIMS product, the SQL injection vulnerability was found in the param1 parameter of the POST request to the endpoint /labvantage/rc?command=page&page=SampleList&_iframename=list.
The following steps were used to identify and confirm the SQL injection vulnerability in the param1 parameter of the POST request to the affected endpoint. The testing was conducted using Burp Suite.
param1 set to a regular integer value 97822.
Figure 1: When we put in param1=97822, the size of the response is shown.
param1 was modified to include an SQL injection payload: param1=97822')+OR+('1'='1.