Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security Bug] Boolean SQL Injection in loan_by_class.php #163

Closed
0xdc9 opened this issue Oct 16, 2022 · 0 comments
Closed

[Security Bug] Boolean SQL Injection in loan_by_class.php #163

0xdc9 opened this issue Oct 16, 2022 · 0 comments
Labels
bug Something isn't working

Comments

@0xdc9
Copy link

0xdc9 commented Oct 16, 2022

Describe the bug
An unsanitized collType parameter can be used to perform bloolean base blind SQL Injection attack

To Reproduce

  1. Log in as admin
  2. go to http://localhost/admin/modules/reporting/customs/loan_by_class.php?reportView=true&year=2002&class=bbbb&membershipType=a&collType=aaaa
  3. capture the request and save it to a file
  4. use sqlmap with this command sqlmap -r <capture_http_req >.req--level 5 --risk 3 --dbms=mysql -p collType --technique=B --current-user

Screenshots

  1. bredel.req

image

  1. sqlmap first run without getting anything from the database

image

  1. sqlmap get current user

Screen Shot 2022-10-16 at 21 22 47

Versions

  • OS: Kali Linux(Debian) 2021
  • Browser: Firefox 78.7.0.esr(64-bit)
  • Slims Version: slims9_bulian-9.4.2
@0xdc9 0xdc9 added the bug Something isn't working label Oct 16, 2022
drajathasan added a commit that referenced this issue Nov 18, 2022
@0xdc9 0xdc9 closed this as completed Nov 24, 2022
hasanbasri1993 pushed a commit to hasanbasri1993/slims9_bulian that referenced this issue Jan 14, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

1 participant