SCRMS 2023-05-27 1.0 Multiple SQL Injection

CVE Category Price Severity
CVE-2023-XXXX CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Unknown High
Author Risk Exploitation Type Date
Unknown High Remote 2023-06-22
CVSS: 4.0

CVSS vector description

Our sensors found this exploit at:

Below is a copy:

SCRMS 2023-05-27 1.0 Multiple SQL Injection
## Exploit Title: SCRMS 2023-05-27 1.0 - Multiple SQLi
## Author: nu11secur1ty
## Date: 05.27.2023
## Vendor:
## Software:
## Reference:

## Description:
The `email` parameter appears to be vulnerable to SQL injection
attacks. The test payloads 45141002' or 6429=6429-- and 37491017' or
5206=5213-- were each submitted in the email parameter. These two
requests resulted in different responses, indicating that the input is
being incorporated into a SQL query in an unsafe way. The attacker can
easily steal all users and their passwords for access to the system.
Even if they are strongly encrypted this will get some time, but this
is not a problem for an attacker to decrypt if, if they are not enough
strongly encrypted.

STATUS: HIGH Vulnerability

Parameter: email (POST)
    Type: boolean-based blind
    Title: OR boolean-based blind - WHERE or HAVING clause
    Payload: email=-1544' OR 2326=2326-- eglC&password=c5K!k0k!T7&login=


## Reproduce:

## Proof and Exploit:

## Time spend:

System Administrator - Infrastructure Engineer
Penetration Testing Engineer
Exploit developer at and
home page:
                          nu11secur1ty <>

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.