vendor:
Cyclope Employee Surveillance Solution
by:
loneferret
9,8
CVSS
HIGH
SQL Injection and Remote Code Execution
89, 94
CWE
Product Name: Cyclope Employee Surveillance Solution
Affected Version From: 6.1.0
Affected Version To: 6.3.0
Patch Exists: NO
Related CWE: N/A
CPE: a:cyclope-series:cyclope_employee_surveillance_solution
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2020
SQL Injection and Remote Code Execution in Cyclope Employee Surveillance Solution v6.0
Due to improper input sensitization, many parameters are prone to SQL injection, most importantly, the username parameter in the application's login form. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system by creating a small php shell in the application's root folder and writing the administrator username and password.
Mitigation:
Input validation should be performed to ensure that user-supplied data is properly sanitized before being used in SQL queries.