CVE-2026-0579
📋 TL;DR
This SQL injection vulnerability in code-projects Online Product Reservation System 1.0 allows attackers to manipulate database queries through the admin edit.php endpoint. Remote attackers can potentially read, modify, or delete database contents. All deployments of version 1.0 are affected.
💻 Affected Systems
- code-projects Online Product Reservation System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data destruction, and potential remote code execution via database functions.
Likely Case
Unauthorized data access, modification of product information, and potential privilege escalation.
If Mitigated
Limited impact with proper input validation and database permissions, potentially only error messages exposed.
🎯 Exploit Status
Exploit requires access to admin interface but SQL injection is straightforward once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://code-projects.org/
Restart Required: No
Instructions:
No official patch available. Consider replacing with alternative software or implementing custom fixes.
🔧 Temporary Workarounds
Input Validation and Parameterized Queries
allImplement proper input validation and use prepared statements for all database queries in edit.php
Modify /handgunner-administrator/edit.php to use PDO or mysqli prepared statements
Web Application Firewall Rules
allDeploy WAF rules to block SQL injection patterns targeting the edit.php endpoint
Add WAF rule: Block requests to /handgunner-administrator/edit.php containing SQL keywords in POST parameters
🧯 If You Can't Patch
- Restrict access to /handgunner-administrator/ directory to trusted IP addresses only
- Implement database user with minimal permissions (read-only for non-admin functions)
🔍 How to Verify
Check if Vulnerable:
Test the edit.php endpoint with SQL injection payloads in prod_id, name, price, model, or serial parameters
Check Version:
Check system documentation or source code for version information
Verify Fix Applied:
Verify that SQL injection attempts return error messages or are properly sanitized without database interaction
📡 Detection & Monitoring
Log Indicators:
- Unusual database queries from web server
- SQL syntax errors in application logs
- Multiple failed login attempts to admin interface
Network Indicators:
- POST requests to /handgunner-administrator/edit.php containing SQL keywords
- Unusual database response times
SIEM Query:
source="web_logs" AND uri="/handgunner-administrator/edit.php" AND (request_body CONTAINS "UNION" OR request_body CONTAINS "SELECT" OR request_body CONTAINS "INSERT")
🔗 References
- https://code-projects.org/
- https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_admin_edit.php.md
- https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_admin_edit.php.md#poc
- https://vuldb.com/?ctiid.339463
- https://vuldb.com/?id.339463
- https://vuldb.com/?submit.731091