Security for everyone

CVE-2022-31982 Scanner

Detects 'SQL Injection' vulnerability in Online Fire Reporting System affects v. 1.0


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one


Parent Category

CVE-2022-31982 Scanner Detail

The Online Fire Reporting System version 1.0 is an essential digital platform designed for fire departments and emergency services to manage and report fire incidents efficiently. This system allows for the digital submission of fire reports, tracking of incidents, and management of team responses, aiming to streamline the coordination between various emergency services. It plays a crucial role in enhancing the speed and efficiency of fire incident responses, ultimately contributing to public safety and well-being. The software is widely used by public safety organizations to ensure a quick and organized response to fire emergencies, leveraging technology to improve emergency services' effectiveness.

CVE-2022-31982 reveals a high-severity SQL Injection vulnerability within the Online Fire Reporting System version 1.0, specifically targeted through the /ofrs/admin/?page=requests/view_request&id= endpoint. This vulnerability stems from inadequate validation and sanitization of user inputs, permitting attackers to inject malicious SQL code into the database queries. This security flaw exposes the system to various threats, including unauthorized access to sensitive data, database manipulation, and potential system compromise, posing a significant risk to the integrity and confidentiality of the data managed by the system.

The vulnerability is identified in the id parameter of the URL path /admin/?page=requests/view_request&id=. Due to insufficient input sanitization, attackers can exploit this parameter by injecting malicious SQL statements, thereby manipulating database queries executed by the application. Successful exploitation could lead to unauthorized access to confidential information, alteration or deletion of data, and potentially, administrative access to the system. This vulnerability underscores the critical need for rigorous input validation and the use of parameterized queries to protect against SQL injection attacks.

The exploitation of this SQL Injection vulnerability could have severe consequences, including unauthorized disclosure of sensitive information, such as personal data of individuals reported in fire incidents, and internal operational details. It may also lead to data integrity issues, where records can be altered or deleted, disrupting the operational capabilities of emergency services. Furthermore, it could serve as a gateway for further attacks, potentially leading to a complete compromise of the system's security and the trust placed in it by its users.

Security for Everyone platform empowers users to proactively identify and address vulnerabilities like SQL Injection within their digital infrastructure. By subscribing to our services, users gain access to comprehensive cyber threat exposure management solutions, including detailed vulnerability assessments, expert remediation guidance, and continuous monitoring capabilities. Our platform leverages state-of-the-art technologies to provide actionable insights, enabling organizations to fortify their cybersecurity posture effectively. Joining Security for Everyone ensures that your systems remain resilient against emerging cyber threats, safeguarding your critical data and maintaining the trust of those who rely on your services.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture