Advertisement






Registration & Login and User Management System With admin panel - SQL Injection (Auth Bypass)

CVE Category Price Severity
N/A CWE-89 $500 High
Author Risk Exploitation Type Date
Anonymous High Remote 2021-07-19
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2021070120

Below is a copy:

Registration & Login and User Management System With admin panel - SQL Injection (Auth Bypass)
# Exploit Title: User Registration & Login and User Management System With admin panel - SQL Injection (Auth Bypass)
# Date: 2021-07-01
# Exploit Author: Aryan Chehreghani
# Vendor Homepage: https://phpgurukul.com
# Software Link: https://phpgurukul.com/user-registration-login-and-user-management-system-with-admin-panel/
# Version: 2.1
# Tested on: Windows 10

SQL Injection:
Injection flaws, such as SQL, NoSQL, and LDAP injection, occur when
untrusted data is sent to an interpreter as part of a command or query. The
attackers hostile data can trick the interpreter into executing unintended
commands or accessing data without proper authorization.

Attack vector:
An attacker can gain admin panel access using malicious sql injection queries.

Steps to reproduce:
1) Open admin login page using following URl:
"http://localhost/loginsystem/admin"

2) Now put the payload below the Username and password field.
Payload: admin' or '1'='1 and you will be successfully logged In as Admin without any credentials.

==============================================
TAPESH DIGITAL SECURITY TEAM IRAN T.ME/ICTUS_TM  |     

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.