header-logo
Suggest Exploit
vendor:
Inventory Webapp
by:
Mohammad Zaheri
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Inventory Webapp
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows
2019

Exploit Title: Inventory Webapp SQL injection

The Inventory Webapp is vulnerable to SQL injection. The vulnerable page is '/php/add-item.php' and the vulnerable source code is on lines 39, 40, 41, 42 and 49. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable page. The proof of concept is http://site.com/php/add-item.php?itemquery=[SQL]

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in an SQL query.
Source

Exploit-DB raw data:

# Exploit Title: Inventory Webapp SQL injection
# Data: 05.09.2019
# Exploit Author: mohammad zaheri
# Vendor HomagePage: https://github.com/edlangley/inventory-webapp
# Tested on: Windows
# Google Dork: N/A


=========
Vulnerable Page:
=========
/php/add-item.php


==========
Vulnerable Source:
==========
Line39: $name = $_GET["name"];
Line39: $description = $_GET["description"];
Line39: $quantity = $_GET["quantity"];
Line39: $cat_id = $_GET["cat_id"];
Line49: if(mysql_query($itemquery, $conn))



=========
POC:
=========
http://site.com/php/add-item.php?itemquery=[SQL]



=========
Contact Me :
=========
Telegram : @m_zhrii
Email : neoboy503@gmail.com