Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-42668 PoC — Engineers Online Portal SQL注入漏洞

Source
Associated Vulnerability
Title:Engineers Online Portal SQL注入漏洞 (CVE-2021-42668)
Description:Engineers Online Portal是开源的一个在线门户。是使用PHP、MySQL 数据库、HTML、CSS、Javascript、jQuery、Ajax、Bootstrap 和一些其他库开发的。 Engineers Online Portal 存在SQL注入漏洞,该漏洞源于在PHP的Sourcecodester Engineers Online Portal中存在一个SQL注入漏洞,通过id参数在my classmates.php网页中。攻击者可利用该漏洞从web服务器提取敏感数据。
Description
CVE-2021-42668 - SQL Injection vulnerability in the Engineers online portal system. 
Readme
# cve-2021-42668
CVE-2021-42668 - SQL Injection vulnerability in the Engineers online portal system. 

# Technical description:
An SQL Injection vulnerability exists in the Engineers Online Portal. An attacker can leverage the vulnerable "id" parameter in the "my_classmates.php" web page in order to manipulate the sql query performed.
As a result the attacker can extract sensitive data from the web server.

Affected components - 

Vulnerable page - my_classmates.php

Vulnerable parameter - "id"

# Steps to exploit:
1) Navigate to http://localhost/nia_munoz_monitoring_system/my_classmates.php
2) Insert your payload in the id parameter

# Proof of concept (Poc) -
The following payload will allow you to extract the MySql server version running on the web server -
```
' union select NULL,NULL,NULL,NULL,NULL,@@version,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL;-- -
```

![CVE-2021-42668](https://user-images.githubusercontent.com/93016131/140190507-39c3361e-6ebd-4eed-9016-e9a6be6bd2db.gif)

# References - 
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42668

https://nvd.nist.gov/vuln/detail/CVE-2021-42668

# Discovered by - 
Alon Leviev(0xDeku), 22 October, 2021. 
File Snapshot

[4.0K] /data/pocs/4fd5c1b0c7f731bc22b894faacc0c928748309e1 └── [1.2K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.