Description
Elaniin CMS 1.0 contains an authentication bypass vulnerability that allows attackers to access the dashboard by manipulating the login page with SQL injection. Attackers can bypass authentication by sending crafted email and password parameters with '=''or' payload to login.php, granting unauthorized access to the system.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
Credits
BKpatron
References
www.exploit-db.com/exploits/48705 (ExploitDB-48705)
elaniin.com/ (Vendor Homepage)
github.com/elaniin/CMS (Elaniin CMS GitHub Repository)
www.vulncheck.com/...ories/elaniin-cms-authentication-bypass (VulnCheck Advisory: elaniin CMS 1.0 - Authentication Bypass)