vendor:
PHotoLa Gallery
by:
Red-D3v1L
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: PHotoLa Gallery
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: YES
Related CWE: N/A
CPE: a:photola:photola_gallery
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
PHotoLa Gallery <= 1.0 (Auth Bypass) SQL injection Valunrability
A vulnerability exists in PHotoLa Gallery version 1.0 which allows an attacker to bypass authentication and gain access to the application. This is due to the application not properly sanitizing user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by supplying a specially crafted 'or 1=1/*' payload in the 'username' parameter of the 'signin.php' page.
Mitigation:
Input validation should be used to ensure that untrusted data is not used to construct SQL queries in an unsafe manner.