vendor:
PHPDomainRegister
by:
Or4nG.M4n
7,5
CVSS
HIGH
SQL Auth Bypass, SQL Injection
89, 79
CWE
Product Name: PHPDomainRegister
Affected Version From: v0.4a-RC2-dev
Affected Version To: v0.4a-RC2-dev
Patch Exists: Unknown
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Unknown
Unknown
PHPDomainRegister v0.4a-RC2-dev => [SQL Auth][SQL Inject][XSS]
PHPDomainRegister v0.4a-RC2-dev contains a vulnerability in the class_AjaxLogin.php file, line 73, where the function is_login() includes the config.php file, line 2, and sets the username session variable, line 4, with the value of the POST username parameter, line 3. This allows an attacker to bypass authentication by setting the username parameter to ' or 1=1 #. Additionally, the index.php file, line 617, contains a SQL injection vulnerability, where the value of the GET pid parameter is used in a SQL query, line 1, without being sanitized. This allows an attacker to inject arbitrary SQL code into the query.
Mitigation:
Input validation should be used to prevent SQL injection attacks. Authentication should be done using a secure method such as hashing or using a secure authentication protocol.