In SalonERP 3.0.1, a SQL injection vulnerability allows an attacker to inject payload using 'sql' parameter in SQL query while generating a report. Upon successfully discovering the login admin password hash, it can be decrypted to obtain the plain-text password.
References
Link | Resource |
---|---|
https://salonerp.sourceforge.io/ | Product Third Party Advisory |
https://sourceforge.net/projects/salonerp/files/latest/download | Product Third Party Advisory |
https://www.exploit-db.com/exploits/50659 | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2022-01-14 20:15
Updated : 2024-02-28 18:48
NVD link : CVE-2021-45406
Mitre link : CVE-2021-45406
CVE.ORG link : CVE-2021-45406
JSON object : View
Products Affected
salonerp_project
- salonerp
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')