Description
WorkOrder CMS 0.1.0 contains a SQL injection vulnerability that allows unauthenticated attackers to bypass login by manipulating username and password parameters. Attackers can inject malicious SQL queries using techniques like OR '1'='1' and stacked queries to access database information or execute administrative commands.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
Credits
Chokri Hammedi
References
www.exploit-db.com/exploits/51038 (ExploitDB-51038)
github.com/romzes13/WorkOrderCMS (WorkOrder CMS GitHub Repository)
www.vulncheck.com/advisories/workorder-cms-sql-injection (VulnCheck Advisory: WorkOrder CMS 0.1.0 - SQL Injection)