Skip to content
master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
CVE-Bins/webERP SQLI-2/
CVE-Bins/webERP SQLI-2/

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
png
 
 
 
 

WebERP SQL injection Vulnerability Description


Testing Target

Abstract

The CollectiveWorkOrderCost.php have SQL Injection vulnerability in SearchParts parameter, here will be to guess the database version and user as an example.

Concept

  1. First, we download the latest version from the official website and build default demo environment. Then login with the default account password.

  2. Click Manufacturing -> Multiple Work Orders Total Cost Inquiry, we came to CollectiveWorkOrderCost.php pages.

  3. In this page, we click Search Items Now and using Burp Suite intercept packet.

  4. Here we insert SQL Injection Payload after the SearchParts parameter.

  • Full Payload:&Submit=&WO_1)union/**/select/**/null,@@version,null,null,null,null,(null=on
  1. That cool we successfully obtained the DB version.

  2. Try another payload and successfully get the current webERP user.

Summary

The webERP is a very popular ERP software in Asia. This is a very serious problem, because attackers can quickly obtain sensitive information about enterprise ERP.