CVE-2022-23168: Amodat Mobile Application Gateway - SQL Injection Authentication Bypass
Amodat Mobile Application Gateway (MAG) is a mobile workforce management platform used by organizations to manage field operations, employee tasks, and mobile access to enterprise systems.
Vulnerability Details
CWE-89: Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)
The login form’s username field is vulnerable to SQL injection, allowing a complete authentication bypass. By entering a simple SQL payload in the username field, an attacker logs in as the admin without knowing the password.
admin'--

The login page with admin'-- in the username field - the single quote closes the SQL string and the double dash comments out the password check. The attacker is authenticated as admin.
The payload works because the application concatenates user input directly into the SQL query without parameterization - something confirmed by reading the source code through the LFI vulnerability (CVE-2022-23167).
Impact
- Full authentication bypass - An attacker gains admin access without any credentials
- Zero-click - No brute-force, no credential theft, just a single login attempt
- Complete system access - Admin privileges grant control over all mobile workforce operations, employee data, and system configurations
- Chaining - The LFI (CVE-2022-23167) revealed the vulnerable SQL query in the source code, making this exploitation trivial
Advisory
- ILVN-ID: ILVN-2022-0023
- CVE-ID: CVE-2022-23168
- Affected Products: Amodat Mobile Application Gateway
- Credit: Moriel Harush
- Solution: Update to 7.12.00.09 version