vendor:
NNT
by:
Momen Eldawakhly
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: NNT
Affected Version From: 5.1
Affected Version To: 5.1
Patch Exists: NO
Related CWE:
CPE: a:nettemp:nnt:5.1
Platforms Tested: Linux (Ubuntu 20.04)
2021
Nettmp NNT 5.1 – SQLi Authentication Bypass
An attacker can bypass authentication by sending a crafted username and password in a POST request to the vulnerable application. The username should be set to '1' or 1=1;-- and the password should be set to ", which will bypass the authentication process and allow the attacker to access the application.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.