header-logo
Suggest Exploit
vendor:
phpPass
by:
SecurityFocus
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: phpPass
Affected Version From: phpPass
Affected Version To: phpPass
Patch Exists: No
Related CWE: N/A
CPE: a:phppass:phppass
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

A problem with phpPass may allow an attacker to launch a SQL injection attack.

phpPass is vulnerable to SQL injection attacks due to insufficient sanitization of user-supplied input. This allows an attacker to inject arbitrary SQL into the database used by a vulnerable site, allowing them to view pages that would normally be restricted. An example of an attack is the following: http://[target]/protectedpage.php?uid='%20OR%20''='&pwd='%20OR%20''='

Mitigation:

Input validation should be used to ensure that user-supplied data is properly sanitized.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/6594/info

A problem with phpPass may allow an attacker to launch a SQL injection attack.

The vulnerability exists in the accesscontrol.php script included with phpPass. Due to insufficient sanitization of user-supplied input, it is possible for a remote user to inject arbitrary SQL into the database used by a vulnerable site. This may allow an attacker to view pages that would normally be restricted.

http://[target]/protectedpage.php?uid='%20OR%20''='&pwd='%20OR%20''='