vendor:
Simple College Website
by:
Marco Catalano
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Simple College Website
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Linux, PHP/7.4.11
2021
Simple College Website 1.0 – ‘name’ Sql Injection (Authentication Bypass)
The source of "/admin_pages/login.php" file defines the following lines of code: $name=$_POST['name']; $password=$_POST['password']; $result=mysqli_query($conn,"SELECT * FROM users WHERE name='$name' AND Password='$password'"); which are called when trying to log into the administrative panel at "/admin_pages/login.php" itself. The user input is not properly sanitized and this leads to authentication bypass through the classic "<username>' or '1' = '1 -- -" where <username> has to be a valid username. For example, the default username is "florian".
Mitigation:
Input validation should be used to prevent SQL injection attacks.