vendor:
Simple E-Document
by:
Ihsan Sencan
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Simple E-Document
Affected Version From: 1.31
Affected Version To: 1.31
Patch Exists: NO
Related CWE: N/A
CPE: a:tecorange:simple_e_document:1.31
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: WiN7_x64/KaLiLinuX_x64
2018
Simple E-Document 1.31 – ‘username’ SQL Injection
Simple E-Document 1.31 is vulnerable to SQL Injection. This vulnerability exists due to insufficient sanitization of user-supplied input to the 'username' parameter in the 'login.php' script. An attacker can exploit this vulnerability to inject and execute arbitrary SQL commands in the application's database. This can be exploited to bypass authentication and gain access to the application.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.