Title | KuERP KuERP <=1.0.4 Authentication bypass |
---|
Description | The KuERP System version 1.0.4 and below has an authentication bypass vulnerability in the /application/index/common.php file. This flaw lies in the checklogin function which accepts and uses the "App_User_id" and "App_User_Token" cookies in the WHERE field of a query. By passing an array with a prefix "think:", it's possible to inject an operator. By setting the cookies "Ape_User_Id" and "Ape_User_Token" with the value "think:["<>", "glzjin"]", an attacker can bypass the checklogin function and gain administrative access. |
---|
Source | ⚠️ https://note.zhaoj.in/share/2dBOnquxgCDl |
---|
User | glzjin (ID 59815) |
---|
Submission | 2024-01-21 11:42 (4 months ago) |
---|
Moderation | 2024-01-28 16:27 (7 days later) |
---|
Status | Przyjęty |
---|
VulDB Entry | 252253 |
---|