vendor:
PHPCRUD
by:
Dimitrios Mitakos
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: PHPCRUD
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:egavilanmedia:phpcrud:1.0
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Debian GNU/Linux 10
2021
EgavilanMedia PHPCRUD 1.0 – ‘First Name’ SQL Injection
EgavilanMedia PHPCRUD 1.0 is vulnerable to SQL injection in the 'First Name' parameter. An attacker can send a malicious payload to the vulnerable parameter to execute arbitrary SQL commands on the underlying database. This can be exploited to gain unauthorized access to the database and its contents.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.