The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[eVuln] MD News Authentication Bypass and SQL Injection


<< Previous INDEX Search src / Print Next >>
Date: 18 Apr 2006 19:58:49 -0000
From: [email protected]
To: [email protected]
Subject: [eVuln] MD News Authentication Bypass and SQL Injection
 Vulnerabilities
X-Virus-Scanned: antivirus-gw at tyumen.ru

New eVuln Advisory:
MD News Authentication Bypass and SQL Injection Vulnerabilities
http://evuln.com/vulns/120/summary.html

--------------------Summary----------------
eVuln ID: EV0120
Software: MD News
Sowtware's Web Site: http://www.matthewdingley.co.uk/
Versions: 1
Critical Level: Moderate
Type: Multiple Vulnerabilities
Class: Remote
Status: Unpatched. No reply from developer(s)
PoC/Exploit: Available
Solution: Not Available
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)

-----------------Description---------------
1. SQL Injection.

Vulnerable script: admin.php

Parameter id is not properly sanitized before being used in SQL query. This can be used to make any SQL query by injecting arbitrary SQL code.


2. Authentication Bypass.

"Administration Area" script has no any authentication. Any user can get access to administrator's area. (Just need to know script name)


--------------PoC/Exploit----------------------
Available at: http://evuln.com/vulns/120/exploit.html

--------------Solution---------------------
No Patch available.

--------------Credit-----------------------
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)


Regards,
Aliaksandr Hartsuyeu
http://evuln.com - Penetration Testing Services
.


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру