Skip to content
Permalink
main
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time

Authentication Bypass in "Resumes Management and Job Application Website" application by EGavilan Media

SQL Injection vulnerability exists in the Resumes Management and Job Application Website application login form by EGavilan Media that allows Authentication Bypass.

SQL Injection attack consists of inserting an SQL query through the input data from the client into the application. Upon successful misuse, it is possible to retrieve detailed data from the database, edit database data such as inserting, updating or deleting data, work with administrative operations in the database, or in some situations run commands directly on the operating system.

Steps to reproduce

  1. Download, install and run Resumes Management and Job Application Website application.
  2. Visit the following resource localhost/login.html.
  3. Enter the below mentioned credentials in the vulnerable field:
  • username: admin'-- -
  • password: anything

Vulnerable form

  1. Press the Login button, this will result in a successful Authentication Bypass.

successful Authentication Bypass

Remediation

  • Use of Prepared Statements (with Parameterized Queries)
  • Use of Stored Procedures
  • Allow-list Input Validation
  • Escaping All User Supplied Input

Discovered by Martin Kubecka, September 15, 2021.