vendor:
Nominas
by:
Ihsan Sencan
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Nominas
Affected Version From: 0.27
Affected Version To: 0.27
Patch Exists: NO
Related CWE: N/A
CPE: a:arixolab:nominas:0.27
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: WiN7_x64/KaLiLinuX_x64
2018
Nominas 0.27 – ‘username’ SQL Injection
Nominas 0.27 is vulnerable to SQL injection in the 'username' parameter of the checklogin.php script. An attacker can exploit this vulnerability to gain access to the database, including the username, database name, and version. This can be done by sending a specially crafted HTTP POST request to the checklogin.php script with the 'username' parameter set to '%27+UNION+ALL+SELECT+0x31%2C0x32%2C0x33%2CCONCAT_WS%280x203a20%2CUSER%28%29%2CDATABASE%28%29%2CVERSION%28%29%29--+Ver+Ayari'
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in an SQL query.