### [CVE-2012-10047](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-10047) ![](https://img.shields.io/static/v1?label=Product&message=Cyclope%20Employee%20Surveillance%20Solution&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=6.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brightgreen) ### Description Cyclope Employee Surveillance Solution versions 6.x is vulnerable to a SQL injection flaw in its login mechanism. The username parameter in the auth-login POST request is not properly sanitized, allowing attackers to inject arbitrary SQL statements. This can be leveraged to write and execute a malicious PHP file on disk, resulting in remote code execution under the SYSTEM user context. ### POC #### Reference - https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/cyclope_ess_sqli.rb - https://www.exploit-db.com/exploits/20393 - https://www.exploit-db.com/exploits/20501 - https://www.vulncheck.com/advisories/cyclope-employee-surveillance-solution-sql-injection #### Github - https://github.com/fkie-cad/nvd-json-data-feeds