제출 #306961: PHPGurukul Emergency Ambulance Hiring Portal 1.0 Remote Code Execution정보

제목PHPGurukul Emergency Ambulance Hiring Portal 1.0 Remote Code Execution
설명Bug Description: A vulnerability in the Emergency Ambulance Hiring Portal 1.0 allows an unauthenticated attacker to execute code on the server by exploiting SQL injection and escalating it to remote code execution. Steps to Reproduce: # Exploit Title: Remote Code Execution in "searchdata" parameter of Emergency Ambulance Hiring Portal # Date: 28-03-2024 # Exploit Author: dhabaleshwardas # Vendor Homepage: https://phpgurukul.com/ # Software Link: https://phpgurukul.com/emergency-ambulance-hiring-portal-using-php-and-mysql/ # Version: 1.0 # Tested on: firefox/chrome/brave # CVE: To exploit the vulnerability: 1- First visit this endpoint http://localhost/eahp/ambulance-tracking.php 2- Then write any random data in the "searchdata" parameter and intercept the request. Save the request in your local machine, then use the command below for sqlmap. 3- The screenshot below shows that the parameter is vulnerable to SQLi and thus we opened up a shell to execute system commands causing Remote Code Execution.
원천⚠️ https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_rce.md
사용자
 dhabaleshwar (UID 58737)
제출2024. 03. 29. PM 12:02 (2 연령 ago)
모더레이션2024. 03. 29. PM 03:27 (3 hours later)
상태수락
VulDB 항목258680 [PHPGurukul Emergency Ambulance Hiring Portal 1.0 Ambulance Tracking Page ambulance-tracking.php searchdata SQL 주입]
포인트들20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!