PHPEasyData 1.5.4 - '/admin/login.php?Username' SQL Injection



EKU-ID: 36847 CVE: CVE-2008-2995;OSVDB-47010 OSVDB-ID:
Author: Sylvain THUAL Published: 2008-06-11 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


source: https://www.securityfocus.com/bid/29659/info

PHPEasyData is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.

An attacker may leverage the cross-site scripting issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Attackers may exploit the SQL-injection issues to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

PHPEasyData 1.5.4 is vulnerable; other versions may also be affected.

-admin/login.php
Due to a lack of sanitization of the user input in admin/login.php we can easily get an access to the admin control panel with the login:
' or 1=1-- /**