<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SQLi on gryfman</title><link>https://gryfman.fr/tags/sqli/</link><description>Recent content in SQLi on gryfman</description><generator>Hugo</generator><language>en-us</language><managingEditor>sussetnoe2004@gmail.com (gryfman)</managingEditor><webMaster>sussetnoe2004@gmail.com (gryfman)</webMaster><lastBuildDate>Mon, 27 Apr 2026 00:00:06 +0200</lastBuildDate><atom:link href="https://gryfman.fr/tags/sqli/index.xml" rel="self" type="application/rss+xml"/><item><title>From login to admin : CVE-2026-41462</title><link>https://gryfman.fr/cves/cve-2026-41462/</link><pubDate>Mon, 27 Apr 2026 00:00:06 +0200</pubDate><author>sussetnoe2004@gmail.com (gryfman)</author><guid>https://gryfman.fr/cves/cve-2026-41462/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;During a security assessment, we identified an unauthenticated SQL injection vulnerability in 
&lt;a href="https://www.projeqtor.com/fr/" target="_blank" rel="noopener"&gt;ProjeQtOr&lt;/a&gt;
, an open source project management platform. The injection point was located in the authentication logic, allow an attacker to inject SQL commands directly into the user field, that was later used to look up user accounts. This flaw could be exploited to create a new administrative user or full access to the database without needing valid credentials.&lt;/p&gt;</description></item></channel></rss>