header-logo
Suggest Exploit
vendor:
Online Appointment Booking System
by:
mohammad zaheri
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Online Appointment Booking System
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows
2019

Online Appointment SQL Injection

This exploit allows an attacker to inject SQL queries into the 'signup.php' page of the Online Appointment Booking System, leading to unauthorized access to the database.

Mitigation:

To mitigate this vulnerability, the developer should use parameterized queries or prepared statements to sanitize user input.
Source

Exploit-DB raw data:

# Exploit Title: Online Appointment SQL Injection 
# Data: 07.09.2019
# Exploit Author: mohammad zaheri
# Vendor HomagePage: https://github.com/girish03/Online-Appointment-Booking-System
# Tested on: Windows
# Google Dork: N/A


=========
Vulnerable Page:
=========
Online-Appointment-Booking-System-master/signup.php


==========
Vulnerable Source:
==========
Line 52: $name=$_POST['fname'];
Line 53: $gender=$_POST['gender'];
Line 54: $dob=$_POST['dob']; 
Line 55: $contact=$_POST['contact'];
Line 56: $email=$_POST['email'];
Line 57: $username=$_POST['username'];
Line 58: $password=$_POST['pwd'];
Line 59: $prepeat=$_POST['pwdr'];
Line 62: if (mysqli_query($conn, $sql)) 

=========
POC:
=========
http://site.com/Online-Appointment-Booking-System-master/signup.php?sql=[SQL]



=========
Contact Me :
=========
Telegram : @m_zhrii
Email : neoboy503@gmail.com