An SQL injection Vulnerability was discovered in Bangresta 1.0 by Security Researcher @nu11secur1ty
## Title: Bangresto 1.0 SQLi
## Author: nu11secur1ty
## Date: 12.16.2022
## Vendor: https://axcora.com/, https://www.hockeycomputindo.com/2021/05/restaurant-pos-source-code-free.html
## Demo: https://axcora.my.id/bangrestoapp/start.php
## Software: https://github.com/mesinkasir/bangresto
## Reference: https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Bangresto
The `itemID` parameter appears to be vulnerable to SQL injection attacks.
The payload ' was submitted in the itemID parameter, and a database
error message was returned.
The attacker can be stooling all information from the database of this
## STATUS: CRITICAL Vulnerability
Parameter: itemID (GET)
Title: MySQL >= 5.1 error-based - Parameter replace (UPDATEXML)
## Proof and Exploit:
## Time spent
Remember, CyberSecurity Starts With You!
- Globally, 30,000 websites are hacked daily.
- 64% of companies worldwide have experienced at least one form of a cyber attack.
- There were 20M breached records in March 2021.
- In 2020, ransomware cases grew by 150%.
- Email is responsible for around 94% of all malware.
- Every 39 seconds, there is a new attack somewhere on the web.
- An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Social Comments Box
Latest posts by RiSec.n0tst3 (see all)
- JD Sports:Cyber Attack affects 10 million customers - 30 January 2023
- InfoSec – A Newbie Guide – InfoSecurity - 25 January 2023
- Apple is accused of censoring apps in Hong Kong and Russia - 22 December 2022