Description
eLection 2.0 contains an authenticated SQL injection vulnerability in the candidate management endpoint that allows attackers to manipulate database queries through the 'id' parameter. Attackers can leverage SQLMap to exploit the vulnerability, potentially gaining remote code execution by uploading backdoor files to the web application directory.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
Credits
J3rryBl4nks
References
www.exploit-db.com/exploits/48122 (ExploitDB-48122)
sourceforge.net/projects/election-by-tripath/ (eLection Project Vendor Homepage)
github.com/...s/eLection-TriPath-/blob/master/SQLiIntoRCE.md (Researcher Exploit Disclosure)
www.vulncheck.com/advisories/election-id-sql-injection (VulnCheck Advisory: eLection 2.0 - 'id' SQL Injection)