diff --git a/Clinical_Browsing_System/Clinical_Browsing_System_Boolean_SQLi.gif b/Clinical_Browsing_System/Clinical_Browsing_System_Boolean_SQLi.gif new file mode 100644 index 0000000..e76c427 Binary files /dev/null and b/Clinical_Browsing_System/Clinical_Browsing_System_Boolean_SQLi.gif differ diff --git a/Clinical_Browsing_System/README.md b/Clinical_Browsing_System/README.md new file mode 100644 index 0000000..d042a29 --- /dev/null +++ b/Clinical_Browsing_System/README.md @@ -0,0 +1,10 @@ +# Clinical Browsing System login.php Boolean SQLi + +There is a Boolean SQL injection vulnerability in the login of clinical browsing system. Through this vulnerability, an attacker can directly log in to the system using the universal password such like \"1'or 1='1\", and even obtain sensitive information in the database through Boolean blind injection. + + +**FOFA query rule**: [body="/KView/ChromeBrowser.exe"](https://fofa.so/result?qbase64=Ym9keT0iL0tWaWV3L0Nocm9tZUJyb3dzZXIuZXhlIg%3D%3D) + +# Demo + +![](Clinical_Browsing_System_Boolean_SQLi.gif) \ No newline at end of file