CVE-2020-37163
Description
QuickDate 1.3.2 contains a SQL injection vulnerability that allows remote attackers to manipulate database queries through the '_located' parameter in the find_matches endpoint. Attackers can inject UNION-based SQL statements to extract database information including user credentials, database name, and system version.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
QuickDate 1.3.2 has a SQL injection in the find_matches endpoint via the '_located' parameter, allowing remote attackers to extract database contents.
Vulnerability
Overview
QuickDate 1.3.2, a PHP-based dating script, contains a SQL injection vulnerability in the find_matches endpoint. The _located parameter is not properly sanitized before being used in database queries, allowing an attacker to inject arbitrary SQL statements. This flaw enables UNION-based SQL injection, which can be exploited to extract sensitive information from the database [1][3].
Exploitation
The attack is performed by sending a crafted POST request to the /find_matches endpoint with a malicious _located parameter. No authentication is required, and the attacker only needs network access to the vulnerable application. The exploit does not require any special privileges or user interaction, making it easily exploitable by remote attackers [1].
Impact
Successful exploitation allows an attacker to retrieve database contents, including user credentials (such as usernames and password hashes), the database name, and the database system version. This information can be used to compromise user accounts or further attack the application and its infrastructure [1][3].
Mitigation
As of the publication date, no official patch has been released for QuickDate 1.3.2. The vendor's website (quickdatescript.com) is no longer accessible, suggesting the product may be abandoned or unsupported [2]. Users are advised to migrate to an alternative solution or implement input validation and parameterized queries as a workaround.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.