Introduction
There is a SQL Injection in editbrand.php in Pharmacy Management System v1.0.
I put all the php files to the web root path, so I use /edituser.php, or it can also be placed at /dawapharma/dawapharma/edituser.php etc.
POC
the “10.3.34-MariaDB-0+deb10ul” is the database version I use, so it is a SQL injection that can echo the content.
POC:
/edituser.php?id=-1%27%20union%20select%201,version(),3,4;--+
Vulnerability Analysis
in the edituser.php, the logic as follows:
the wabpage use the id parameter as part of sql statement directly.