[] NeoSense

PHPEasyData 1.5.4 - '/admin/login.php?Username' SQL Injection

Author: Sylvain THUAL
type: webapps
platform: php
port: 
date_added: 2008-06-11 
date_updated: 2014-02-26 
verified: 1 
codes: CVE-2008-2995;OSVDB-47010 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/29659/info

PHPEasyData is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.

An attacker may leverage the cross-site scripting issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Attackers may exploit the SQL-injection issues to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

PHPEasyData 1.5.4 is vulnerable; other versions may also be affected.

-admin/login.php
Due to a lack of sanitization of the user input in admin/login.php we can easily get an access to the admin control panel with the login:
' or 1=1-- /**