Submit #262646: cxbsoft Post-Office ≤v1.0 SQL Injectioninfo

Titlecxbsoft Post-Office ≤v1.0 SQL Injection
DescriptionThe Post-Office application, specifically version v1.0 or below, has been identified to contain a SQL Injection vulnerability within its /apps/login_auth.php file. The flaw arises due to the unfiltered inclusion of the 'username_login' parameter in the SQL query, which can be exploited by attackers. By crafting malicious SQL commands, such as using the 'sleep' function in an injected payload, attackers can manipulate the backend database, potentially leading to unauthorized access or data compromise. This security issue has been disclosed by the author glzjin, and users of the affected software hosted on GitHub and discussed on various forums are advised to seek patches or updates to mitigate the risk.
Source⚠️ https://note.zhaoj.in/share/neURUa2NSxzd
Userglzjin (ID 59815)
Submission01/05/2024 05:40 (4 months ago)
Moderation01/14/2024 17:38 (9 days later)
StatusAccepted
VulDB Entry250699

Do you know our Splunk app?

Download it now for free!