header-logo
Suggest Exploit
vendor:
Customer Relationship Management System (CRM)
by:
Shafique_Wasta
8,8
CVSS
HIGH
SQL Injection Authentication Bypass
89
CWE
Product Name: Customer Relationship Management System (CRM)
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:customer_relationship_management_system:1.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 10/xampp
2021

Customer Relationship Management System (CRM) 1.0 – Sql Injection Authentication Bypass

Customer relationship management system is vulnerable to Sql Injection Auth Bypass. Exploit Working: Visit on localhostcrm/customer/login.php, You will see the login panel, use this payload ( '=' 'or' ) in username and click on signin you will login into the admin account.

Mitigation:

Input validation and sanitization should be done to prevent SQL injection attacks.
Source

Exploit-DB raw data:

# Exploit Title: Customer Relationship Management System (CRM) 1.0 - Sql Injection Authentication Bypass
# Date: 27/07/2021
# Exploit Author: Shafique_Wasta
# Vendor Homepage: https://www.sourcecodester.com/php/14794/customer-relationship-management-crm-system-php-source-code.html
# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/crm_0.zip
# Version: 1
# Tested on: Windows 10/xampp

# DESCRIPTION #

# Customer relationship management system is vulnerable to Sql Injection Auth Bypass

# Exploit Working:
# 1. Visit on localhostcrm/customer/login.php
# 2. You will see the login panel
# 3. use this payload ( '=' 'or' ) in username and click on signin you will login into the admin account.

# Vulnerable URL :http://localhost/crm/customer/login.php
# Payload: '=' 'or'