header-logo
Suggest Exploit
vendor:
WebFileExplorer
by:
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: WebFileExplorer
Affected Version From: 3.6
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

WebFileExplorer SQL Injection Vulnerabilities

WebFileExplorer is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Mitigation:

Proper input validation and sanitization should be implemented to prevent SQL injection attacks. Prepared statements or parameterized queries should be used to ensure that user-supplied input is properly escaped before being included in SQL queries.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/48233/info

WebFileExplorer is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

WebFileExplorer 3.6 is vulnerable; other versions may also be affected. 

Supplying the following input to the username or password field is sufficient to exploit these issues:

user: admin' or '1=1
pass: anything