Description
PHP Timeclock 1.04 contains time-based and boolean-based blind SQL injection vulnerabilities in the login_userid parameter of login.php that allows unauthenticated attackers to extract database contents. Attackers can submit crafted POST requests with SQL payloads using SLEEP functions or RLIKE conditional statements to dump sensitive database information including employee names and credentials.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
Credits
Tyler Butler
References
www.exploit-db.com/exploits/49849 (ExploitDB-49849)
timeclock.sourceforge.net (Official Product Homepage)
sourceforge.net/...k/files/PHP Timeclock/PHP Timeclock 1.04/ (Product Reference)
www.vulncheck.com/...p-timeclock-sql-injection-via-login-php (VulnCheck Advisory: PHP Timeclock 1.04 SQL Injection via login.php)