Permalink
Cannot retrieve contributors at this time
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
sqlinj/poc
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
31 lines (23 sloc)
847 Bytes
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Exploit Title: Merchandise Online Store System - SQL Injection "Unauthorized Admin Access" | |
| # Exploit Author: Pratik Shetty | |
| # Vendor Name: oretnom23 | |
| # Vendor Homepage: https://www.sourcecodester.com/php/14887/merchandise-online-store-php-free-source-code.html | |
| # Software Link: https://www.sourcecodester.com/php/14887/merchandise-online-store-php-free-source-code.html | |
| # Version: v1.0 | |
| # Tested on: Parrot GNU/Linux 4.10, Apache | |
| # CVE: CVE-2022-42237 | |
| Description:- | |
| An SQL injection issue in Merchandise Online Store System v.1.0 allows an attacker to logi in into admin account. | |
| ` | |
| Payload used:- | |
| admin' or 1=1 | |
| ` | |
| Parameter:- | |
| Username and Password | |
| ` | |
| Steps to reproduce:- | |
| 1. First go the admin login | |
| 2. From there in username and password put the payload | |
| Payload: | |
| admin' or 1=1 | |
| 3. Now press enter and we get logged in into admin account |