SourceCodester Computer Laboratory Management System 1.0 (manage_item.php) - SQL Injection

2024.08.21
in 0xm3m (IN) in
Risk: Medium
Local: Yes
Remote: No
CWE: N/A

# Exploit Title: SourceCodester Computer Laboratory Management System 1.0 (manage_item.php) - SQL Injection # Date: 1 April 2024 # Exploit Author: Gnanaraj Mauviel (@0xm3m) # Vendor Homepage: https://www.sourcecodester.com/php/17268/computer-laboratory-management-system-using-php-and-mysql.html # Version: v1.0 # CVE: CVE-2024-31565 # Tested on: Mac OSX, XAMPP, Apache, MySQL ------------------------------------------------------------------------------------------------------------------------------------------- [Suggested description] Sourcecodester Computer Laboratory Management System 1.0 is vulnerable to SQL Injection via the 'id' parameter in /admin/item/manage_item.php?id=1'. ------------------------------------------ [Vulnerability Type] SQL Injection ------------------------------------------ [Vendor of Product] SourceCodester ------------------------------------------ [Affected Product Code Base] SourceCodester Computer Laboratory Management System - 1.0 ------------------------------------------ [Affected Component] The functionality allowing users to manage the items information within the application. ------------------------------------------ [Attack Type] Local ------------------------------------------ [Impact Code execution] true ------------------------------------------ [Impact Denial of Service] true ------------------------------------------ [Impact Information Disclosure] true ------------------------------------------ [Attack Vectors] To exploit this vulnerability, the following payload can be used to retrieve the data from the database id=1' AND (SELECT 6230 FROM (SELECT(SLEEP(5)))AYlp) AND 'raoS'='raoS on 'id' parameter on 'http://localhost/php-lms/admin/item/manage_item.php?id=1' ------------------------------------------ [Reference] https://www.strongboxit.com/ [Discoverer] Gnanaraj Mauviel with StrongBox IT Private Limited


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top