OrangeHRM < 2.1 alpha 5 login.php txtUserName Parameter SQL Injection

medium Nessus Network Monitor Plugin ID 3928

Synopsis

The remote web server contains a PHP script that is affected by a SQL injection vulnerability.

Description

The remote host is running OrangeHRM, a human resource management system written in PHP. The version of OrangeHRM installed on the remote host fails to sanitize input to the 'txtUserName' parameter of the 'login.php' script before using it in a database query. An unauthenticated remote attacker may be able to leverage this flaw to manipulate SQL queries and bypass authentication, uncover sensitive information, modify data, or launch attacks against the underlying database.

Note that successful exploitation of this issue requires that PHP's 'magic_quotes_gpc' be disabled.

Solution

Upgrade to version 2.1 alpha 5 or higher.

See Also

http://www.nessus.org/u?3e41c792

Plugin Details

Severity: Medium

ID: 3928

Family: Web Servers

Published: 3/1/2007

Updated: 3/6/2019

Nessus ID: 24743

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:A/AC:H/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:orangehrm:orangehrm

Reference Information

CVE: CVE-2007-1193

BID: 22756