Skip to content

Latest commit

 

History

History
31 lines (22 loc) · 1.52 KB

SQLi.md

File metadata and controls

31 lines (22 loc) · 1.52 KB

Budget Management - Unauthenticated SQL Injection

Description:

Budget Management is vulnerable to a unauthenticated SQL injection vulnerability. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit the latest vulnerabilities in the underlying database.

Proof of Concept:

  • Go to http://localhost/PHP-Budget-Calculator/index.php
  • Add in Budget Title b2 and in Amount 111 and then click on the button Save.
  • Click now on the button delete and intercept this request
  • Add this payload: (select*from(select(sleep(12)))a)
  • The full GET reqeust becomes now like this: GET /PHP-Budget-Calculator/process.php?delete=(select*from(select(sleep(12)))a)
  • Click now on the button Forward.
  • Now you will see a time delay of 12 seconds, thus confirming the unauthenticated time based sql injection.

SQLi

SQLi