My Admin (Powered By Learning Impact) - SQL Injection Authentication Bypass
My Admin 存在 SQL 注入漏洞,允许攻击者通过篡改用户名或密码字段绕过登录认证。利用 `' OR 1=1 LIMIT 1 -- -+` 等 payload 可强制 WHERE 子句为真,获取管理员权限。建议采用预处理语句、输入验证及数据库最小权限原则修复此漏洞。 2025-12-1 16:53:40 Author: cxsecurity.com(查看原文) 阅读量:3 收藏

# Exploit Title: My Admin (Powered By Learning Impact) - SQL Injection Authentication Bypass # Date: 2025-11-26 # Exploit Author: 6ickzone # Vendor Homepage: https://learningimpactmodel.com/ # Software Link: https://learningimpactmodel.com/siteadmin/index.php # Category: Webapps # CWE: CWE-89 --- ## Description: A critical SQL Injection (SQLi) vulnerability was discovered in the sign-in mechanism of the "My Admin" portal, powered by "Learning Impact". The vulnerability allows an unauthenticated attacker to bypass the login page entirely by manipulating the input fields (Username and/or Password). The application fails to properly neutralize special elements in the input before it is used in the SQL query, leading to an exploitable condition. ### Proof of Concept (PoC): An attacker can utilize the following generic payload in the Username field to inject a condition that forces the WHERE clause to evaluate as true, bypassing the required password check. **Payload:** `' OR 1=1 LIMIT 1 -- -+` When the server processes this input, the resulting SQL query authenticates the attacker as the first user found in the database (often an Administrator or the highest-privileged account), granting unauthorized access to the administration panel. ### Mitigation: Developers must implement **Prepared Statements (Parameterized Queries)** to ensure all user input is treated as data, not executable code. Additionally, implementing input validation and adopting the principle of least privilege for the database connection are strongly recommended to prevent this class of attack.



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2025120001
如有侵权请联系:admin#unsafe.sh