Eskolar CMS 0.9.0.0 Blind SQL Injection Exploit and bypass admin logon vulnerability
The Eskolar CMS 0.9.0.0 version is affected by a blind SQL injection vulnerability and a bypass admin logon vulnerability. The application does not properly sanitize user input, allowing for the injection of crafted SQL queries. This can lead to the generation of invalid SQL queries by the database server. A blind SQL injection attack can be used to determine the username and password for the CMS. Additionally, a classical SQL injection can be used to bypass the admin logon. The passwords for the CMS are stored in the database as clear text. While addslashes() function is used to filter GET variables, it is possible to prepare an SQL query without slashes in a blind attack. There is no addslashes() function used to filter variables used for logging in, allowing for classical SQL injection to log in as admin.