vendor:
Simple Payroll System
by:
Yash Mahajan
9.8
CVSS
CRITICAL
SQL Injection
89
CWE
Product Name: Simple Payroll System
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE:
CPE: a:sourcecodester:simple_payroll_system:1.0
Platforms Tested: Windows 10
2021
Simple Payroll System 1.0 – SQLi Authentication Bypass
Simple Payroll System v1.0 Login page can be bypassed with a SQLi into the username parameter. An attacker can send a malicious payload into the username field as ' or 1=1-- without double-quotes and type anything into the password field. This will allow the attacker to bypass the authentication and gain access to the system as an administrator.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in an SQL query.