header-logo
Suggest Exploit
vendor:
PizzaInn_Project
by:
vinicius777
7,5
CVSS
HIGH
SQL Injection Time Based Blind
89
CWE
Product Name: PizzaInn_Project
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020

PizzaInn_Project – SQL Injection

A SQL Injection vulnerability exists in the PizzaInn_Project web application. An attacker can send a maliciously crafted HTTP request to the vulnerable application, which can allow the attacker to execute arbitrary SQL commands on the underlying database. The vulnerable code is located in the reserve-exec.php file, where the application is not properly sanitizing user-supplied input before using it in an SQL query.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in an SQL query. Additionally, parameterized queries should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

##########################################################################
[+] Exploit: PizzaInn_Project - SQL Injection                            #
[+] Author: vinicius777					                 #
[+] Contact: vinicius777 [AT] gmail  @vinicius777_                       #	                 
[+] Vendor Homepage: http://sourceforge.net/projects/restaurantmis/  	 #
##########################################################################

  
 
[1] Sql Injection Time Based Blind

PoC:  http://127.0.0.1/reserve-exec.php?id=1' [SQL Injection]


Vulnerable Code:
[+] reserve-exec.php


            $id = $_GET['id'];
            $qry = "INSERT INTO reservations_details(member_id,table_id,partyhall_id,Reserve_Date,Reserve_Time,table_flag,partyhall_flag) VALUES('$id','$table_id','$partyhall_id','$date','$time','$table_flag','$partyhall_flag')";
            mysql_query($qry)



#
#
# Greetz to g0tm1lk and TheColonial.