vendor:
Complaints Report Management System
by:
mosaaed
9.8
CVSS
HIGH
SQL Injection / Remote Code Execution
89
CWE
Product Name: Complaints Report Management System
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:complaints_report_management_system
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Parrot 5.5.17 + Apache 2.4.46
2020
Complaints Report Management System 1.0 – ‘username’ SQL Injection / Remote Code Execution
An attacker can exploit a SQL injection vulnerability in Complaints Report Management System 1.0 to gain access to the admin panel and execute arbitrary code on the server. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'username' parameter of the 'admin/ajax.php?action=save_settings' script. An attacker can send a specially crafted request with malicious SQL statements to the vulnerable script and execute arbitrary code on the server.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.