Project: Github Paroxyste/Simply-Blog 20190102

Vulnerability: #9224515 (2019-01-02 06:08:03)

Warning

There are many false positives, or unexploitable vulnerabilities. Please create working "PoC" exploit before reporting anything to vendor!

Details:

Sink @FUNCTION::mysqli_query
Risk _GET
/Simply-Blog-master/posts/post.php:23 (show/hide source)
3  require_once("../includes/database.php");
4  require_once("../includes/sessions.php");
5  require_once("../includes/functions.php");
6  
7  if(isset($_POST["submit"])) {
8  	$Name = mysqli_real_escape_string($Connection, $_POST["Name"]);
9  	$Email = mysqli_real_escape_string($Connection, $_POST["Email"]);
10  	$Comment = mysqli_real_escape_string($Connection, $_POST["Comment"]);
11  	$CurrentTime = time();
12  	$DateTime = date('d M Y', $CurrentTime);
13  	$DateTime;
14    $Author = "Laurent Echeverria";
15    $PostId = $_GET["id"];
16  
17  	if(empty($Name) || empty($Email) || empty($Comment)) {
18  		$_SESSION["ErrorMessage"] = "All Fileds Are Required !";
19  
20  	} elseif(strlen($Comment) > 160) {
21  		$_SESSION["ErrorMessage"] = "Only 160 characters are allowed in comment.";
22  	} else {
23 $PostIdFromURL = $_GET["id"];
24 $Query = "INSERT INTO comments (datetime, name, email, comment, status, admin_panel_id) 25 VALUES ('$DateTime', '$Name', '$Email', '$Comment', 'Off', '$PostIdFromURL')";
Threat level 1

Callstack:

@INLINE::/Simply-Blog-master/posts/post.php /Simply-Blog-master/posts/post.php:26 (show/hide source)
6  
7  if(isset($_POST["submit"])) {
8  	$Name = mysqli_real_escape_string($Connection, $_POST["Name"]);
9  	$Email = mysqli_real_escape_string($Connection, $_POST["Email"]);
10  	$Comment = mysqli_real_escape_string($Connection, $_POST["Comment"]);
11  	$CurrentTime = time();
12  	$DateTime = date('d M Y', $CurrentTime);
13  	$DateTime;
14    $Author = "Laurent Echeverria";
15    $PostId = $_GET["id"];
16  
17  	if(empty($Name) || empty($Email) || empty($Comment)) {
18  		$_SESSION["ErrorMessage"] = "All Fileds Are Required !";
19  
20  	} elseif(strlen($Comment) > 160) {
21  		$_SESSION["ErrorMessage"] = "Only 160 characters are allowed in comment.";
22  	} else {
23      $PostIdFromURL = $_GET["id"];
24      $Query = "INSERT INTO comments (datetime, name, email, comment, status, admin_panel_id)
25                VALUES ('$DateTime', '$Name', '$Email', '$Comment', 'Off', '$PostIdFromURL')";
26 $Execute = mysqli_query($Connection, $Query);
27 28 if($Execute) {