Description
DIGIT CENTRIS ERP contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the datum1, datum2, KID, and PID parameters. Attackers can send POST requests to /korisnikinfo.php with malicious SQL syntax in these parameters to extract or modify sensitive database information.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
Credits
n1x_ [MS-WEB]
References
www.exploit-db.com/exploits/47401 (ExploitDB-47401)
www.vulncheck.com/...rsion-sql-injection-via-datum-parameter (VulnCheck Advisory: DIGIT CENTRIS ERP Every version SQL Injection via datum1 Parameter)