vendor:
SaphpLesson
by:
SwEET-DeViL
8,8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: SaphpLesson
Affected Version From: 4.0
Affected Version To: 4.0
Patch Exists: NO
Related CWE: N/A
CPE: a:saphplesson:saphplesson:4.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020
SaphpLesson v4.0 (Auth Bypass) SQL Injection Vulnerability
SaphpLesson v4.0 is vulnerable to an authentication bypass vulnerability due to the lack of input validation in the CleanVar() function. An attacker can exploit this vulnerability by sending malicious input to the username and password fields in the login page. This will allow the attacker to bypass authentication and gain access to the application.
Mitigation:
Input validation should be implemented to ensure that only valid data is accepted by the application. Additionally, the application should use prepared statements to prevent SQL injection attacks.