Summary
This host is installed with SimpleHRM and is prone to sql injection vulnerability.
Impact
Successful exploitation will allow attacker to manipulate SQL queries in the backend database allowing for the manipulation or disclosure of arbitrary data.
Impact Level: Application
Solution
No solution or patch is available as of 20th February, 2015. Information regarding this issue will be updated once the solution details are available.
For updates refer to http://www.simplehrm.com
Insight
Flaw is due to the /index.php/user/setLogin script not properly sanitizing user-supplied input to the 'username' parameter.
Affected
SimpleHRM version 2.3 and 2.2, Other versions may also be affected.
Detection
Send a crafted HTTP GET request and check whether it is able to execute sql query or not.
References
Severity
Classification
-
CVE CVE-2013-2498 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Ajax File and Image Manager 'data.php' PHP Code Injection Vulnerability
- ActualAnalyzer Lite 'ant' Cookie Parameter Remote Command Execution Vulnerability
- 68designs 68kb Multiple Remote File Include Vulnerabilities
- Atlassian JIRA FishEye and Crucible Plugins XML Parsing Unspecified Security Vulnerability
- AWCM CMS Multiple Remote File Include Vulnerabilities