exploit-db-mirror/platforms/php/webapps/31098.txt
Offensive Security 9714bc13e9 Updated 01_22_2014
2014-01-22 04:23:46 +00:00

17 lines
No EOL
572 B
Text
Executable file

source: http://www.securityfocus.com/bid/27589/info
Simple OS CMS is prone to an SQL-injection vulnerability because it fails to adequately sanitize user-supplied data.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Simple OS CMS 0.1c beta is vulnerable; other versions may also be affected.
The following exploit information is available:
Passing:
username: admin' or 1=1/*
password: something
will bypass the authentication process.