Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

OrangeHRM < 2.1 alpha 5 login.php txtUserName Parameter SQL Injection



The remote web server contains a PHP script that is affected by a SQL injection vulnerability.


The remote host is running OrangeHRM, a human resource management system written in PHP. The version of OrangeHRM installed on the remote host fails to sanitize input to the 'txtUserName' parameter of the 'login.php' script before using it in a database query. An unauthenticated remote attacker may be able to leverage this flaw to manipulate SQL queries and bypass authentication, uncover sensitive information, modify data, or launch attacks against the underlying database.

Note that successful exploitation of this issue requires that PHP's 'magic_quotes_gpc' be disabled.


Upgrade to version 2.1 alpha 5 or higher.