Description
QuickDate 1.3.2 contains a SQL injection vulnerability that allows remote attackers to manipulate database queries through the '_located' parameter in the find_matches endpoint. Attackers can inject UNION-based SQL statements to extract database information including user credentials, database name, and system version.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
Credits
Ihsan Sencan
References
www.exploit-db.com/exploits/48022 (ExploitDB-48022)
web.archive.org/...200112151117/https://quickdatescript.com/ (Archived QuickDate Script Webpage)
www.vulncheck.com/advisories/quickdate-sql-injection (VulnCheck Advisory: QuickDate 1.3.2 - SQL Injection)