In SalonERP 3.0.1, a SQL injection vulnerability allows an attacker to inject payload using 'sql' parameter in SQL query while generating a report. Upon successfully discovering the login admin password hash, it can be decrypted to obtain the plain-text password.
References
Link | Resource |
---|---|
https://salonerp.sourceforge.io/ | Product Third Party Advisory |
https://www.exploit-db.com/exploits/50659 | Exploit Third Party Advisory VDB Entry |
https://sourceforge.net/projects/salonerp/files/latest/download | Product Third Party Advisory |
Configurations
Information
Published : 2022-01-14 12:15
Updated : 2022-01-21 11:38
NVD link : CVE-2021-45406
Mitre link : CVE-2021-45406
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
salonerp_project
- salonerp