header-logo
Suggest Exploit
vendor:
COVID19 Testing Management System
by:
Rohit Burke
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: COVID19 Testing Management System
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: No
Related CWE: N/A
CPE: a:phpgurukul:covid19_testing_management_system:1.0
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10
2021

COVID19 Testing Management System 1.0 – SQL Injection (Auth Bypass)

An attacker can gain admin panel access using malicious sql injection queries.

Mitigation:

1) Use parameterized queries to prevent SQL injection. 2) Use input validation to prevent malicious data from entering the system. 3) Use stored procedures to prevent SQL injection. 4) Use web application firewalls to detect and block malicious requests.
Source

Exploit-DB raw data:

# Exploit Title: COVID19 Testing Management System 1.0 - SQL Injection (Auth Bypass)
# Date: 19/05/2021
# Exploit Author: Rohit Burke
# Vendor Homepage: https://phpgurukul.com
# Software Link: https://phpgurukul.com/covid19-testing-management-system-using-php-and-mysql/
# Version: 1.0
# Tested on: Windows 10

SQL Injection:
Injection flaws, such as SQL, NoSQL, and LDAP injection, occur when
untrusted data is sent to an interpreter as part of a command or query. The
attacker’s hostile data can trick the interpreter into executing unintended
commands or accessing data without proper authorization.

Attack vector:
An attacker can gain admin panel access using malicious sql injection queries.

Steps to reproduce:
1) Open admin login page using following URl:
"http://localhost/covid-tms/login.php"

2) Now put the payload below the Username and password field.
Payload: admin' or '1'='1 and you will be successfully logged In as Admin without any credentials.