vendor:
Simple OS CMS
by:
SecurityFocus
7.5
CVSS
HIGH
SQL-injection
89
CWE
Product Name: Simple OS CMS
Affected Version From: 0.1c beta
Affected Version To: 0.1c beta
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
Simple OS CMS SQL-injection Vulnerability
Simple OS CMS is prone to an SQL-injection vulnerability because it fails to adequately sanitize user-supplied data. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. An attacker can bypass the authentication process by passing username: admin' or 1=1/* and password: something.
Mitigation:
Input validation should be used to ensure that untrusted data is not used to modify the intended SQL query. Additionally, parameterized queries should be used to prevent SQL injection attacks.