vendor:
Thrive Smart Home
by:
LiquidWorm
7.5
CVSS
HIGH
SQL Injection Authentication Bypass
89
CWE
Product Name: Thrive Smart Home
Affected Version From: 1.1
Affected Version To: 1.1
Patch Exists: NO
Related CWE: N/A
CPE: a:thrive:thrive_smart_home:1.1
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Apache/2.4.41 (centos) OpenSSL/1.0.2k-fips, Apache httpd 2.4.25 (Raspbian)
2019
Exploit: Thrive Smart Home 1.1 – Authentication Bypass
The application suffers from an SQL Injection vulnerability. Input passed through 'user' POST parameter in checklogin.php is not properly sanitised before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code and bypass the authentication mechanism.
Mitigation:
Input validation should be used to prevent SQL injection attacks.