vendor:
Online Employees Work From Home Attendance System
by:
Merve Oral
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Online Employees Work From Home Attendance System
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE:
CPE: a:sourcecodester:online_employees_work_from_home_attendance_system:1.0
Platforms Tested: Windows 10, Kali Linux
2021
Online Employees Work From Home Attendance System 1.0 – SQLi Authentication Bypass
Online Employees Work From Home Attendance System/Logs in a Web App v1.0 Login page can be bypassed with a simple SQLi to the username parameter. The attacker can send a payload to the username field as 'admin' or '1'='1' without double-quotes and type anything to the password field. This will allow the attacker to bypass the authentication and gain access to the application.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.