vendor:
SalesERP
by:
Mehmet EMIROGLU
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: SalesERP
Affected Version From: v8.1
Affected Version To: v8.1
Patch Exists: NO
Related CWE: N/A
CPE: a:codecanyon:saleserp:8.1
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Wamp64, Windows
2019
SalesERP v.8.1 SQL Inj.
SalesERP v.8.1 is vulnerable to SQL Injection. Attackers can inject malicious SQL queries via the 'customer_id' and 'product_id' parameters in the POST request. The attack pattern used is '%27/**/oR/**/4803139=4803139/**/aNd/**/%276199%27=%276199'. This can be used to gain unauthorized access to the database.
Mitigation:
Input validation should be used to prevent SQL Injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.