vendor:
Simple Public Chat Room
by:
Richard Jones
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Simple Public Chat Room
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:simple_public_chat_room:1.0
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 10 Home 19041 (x64_86) + XAMPP 7.2.34
2021
Simple Public Chat Room 1.0 – Authentication Bypass SQLi
A SQL injection vulnerability exists in Simple Public Chat Room 1.0, which allows an attacker to bypass authentication by sending a specially crafted HTTP POST request. The vulnerability is due to insufficient sanitization of user-supplied input in the 'username' and 'password' parameters of the 'login.php' script. An attacker can exploit this vulnerability by sending a malicious HTTP POST request with a crafted payload in the 'username' and 'password' parameters. This will allow the attacker to bypass authentication and gain access to the application.
Mitigation:
Input validation should be performed to ensure that user-supplied input is properly sanitized before being used in SQL queries.