.. / CVE-2023-33584

Exploit for Enrollment System Project v1.0 - SQL Injection Authentication Bypass (CVE-2023-33584)

Description:

Enrollment System Project V1.0, developed by Sourcecodester, has been found to be vulnerable to SQL Injection (SQLI) attacks. This vulnerability allows an attacker to manipulate the SQL queries executed by the application. The system fails to properly validate user-supplied input in the username and password fields during the login process, enabling an attacker to inject malicious SQL code. By exploiting this vulnerability, an attacker can bypass authentication and gain unauthorized access to the system.

Affected Products:

Nuclei Template

View the template here CVE-2023-33584.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2023/CVE-2023-33584.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2023-33584
https://www.exploit-db.com/exploits/51501
https://nvd.nist.gov/vuln/detail/CVE-2023-33584
https://packetstormsecurity.com/files/cve/CVE-2023-33584
https://www.sourcecodester.com/php/14444/enrollment-system-project-source-code-using-phpmysql.html
https://github.com/akarrel/test_enrollment