| Título | BiggiDroid Simple-PHP-Blog 1.0 SQL Injection |
|---|
| Descripción | In BiggiDroid Simple PHP CMS, admin/login.php concatenates the username and password directly into the SQL query without any sanitization.
An attacker can type:
xxx' OR '1'='1'--
in the password field, turning the entire WHERE clause into a always-true condition. This lets them log in to the admin panel without the correct password, achieving a “universal user” takeover. |
|---|
| Fuente | ⚠️ https://gitee.com/devilrunsun/mywork/issues/IDGMME |
|---|
| Usuario | devil_run_sun (UID 93950) |
|---|
| Sumisión | 2025-12-29 14:05 (hace 3 meses) |
|---|
| Moderación | 2025-12-29 16:14 (2 hours later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 338657 [BiggiDroid Simple PHP CMS 1.0 Admin Login /admin/login.php Nombre de usuario inyección SQL] |
|---|
| Puntos | 20 |
|---|