Description
Vianeos OctoPUS 5 contains a time-based blind SQL injection vulnerability in the 'login_user' parameter during authentication requests. Attackers can exploit this vulnerability by crafting malicious POST requests with specially constructed SQL payloads that trigger database sleep functions to extract information.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
Credits
Audencia Business SCHOOL
References
www.exploit-db.com/exploits/50078 (ExploitDB-50078)
www.vianeos.com/en/home-vianeos/ (Vendor Homepage)
vianeos.com/en/products/octopus (Software Product Page)
www.vulncheck.com/advisories/vianeos-octopus-loginuser-sqli (VulnCheck Advisory: Vianeos OctoPUS 5 - 'login_user' SQLi)