Exploit PHPEasyData 1.5.4 - '/admin/login.php?Username' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
31905
Проверка EDB
  1. Пройдено
Автор
SYLVAIN THUAL
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-2995
Дата публикации
2008-06-11
Код:
source: https://www.securityfocus.com/bid/29659/info
 
PHPEasyData is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
 
An attacker may leverage the cross-site scripting issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
 
Attackers may exploit the SQL-injection issues to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
 
PHPEasyData 1.5.4 is vulnerable; other versions may also be affected.

-admin/login.php
Due to a lack of sanitization of the user input in admin/login.php we can easily get an access to the admin control panel with the login:
' or 1=1-- /**
 
Источник
www.exploit-db.com

Похожие темы