vendor:
Quick.CMS
by:
./H4X.Forensics - Diyar
6.1
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Quick.CMS
Affected Version From: 6.7
Affected Version To: 6.7
Patch Exists: NO
Related CWE:
CPE: a:opensolution:quick.cms:6.7
Platforms Tested: Windows
2024
Quick.CMS 6.7 SQL Injection Login Bypass
The exploit allows an attacker to bypass authentication in Quick.CMS 6.7 by using a specific SQL injection payload. By entering the payload ' or '1'='1 in the email field and proceeding with the login, the attacker can successfully bypass the authentication and gain unauthorized access to the admin panel.
Mitigation:
To mitigate this vulnerability, it is recommended to sanitize user inputs, implement prepared statements or parameterized queries, and apply the principle of least privilege.