vendor:
N/A
by:
x0r
9
CVSS
HIGH
SQL Injection
89
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: No
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
Grestul Sql Injection By Cookie (bypass)
The vulnerability exists due to insufficient sanitization of user-supplied input in the 'username' and 'passcode' parameters of the 'login.php' script. A remote attacker can send a specially crafted HTTP request with malicious JavaScript code to the vulnerable script and execute arbitrary SQL commands in the application database. This can be exploited to bypass authentication and gain access to the application.
Mitigation:
Input validation should be used to prevent SQL injection attacks. The application should also use a least-privilege model to limit the access of the application to the database.