lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070630145204.28681.qmail@securityfocus.com> Date: 30 Jun 2007 14:52:04 -0000 From: underwater@...efence.ru To: bugtraq@...urityfocus.com Subject: WheatBlog 1.1 RFI/SQL Injection Found by E.Minaev (underwater@...efence.ru) ITDefence.ru 1) SQL Injection in login function. With help of this injection is possible to make per-symbol brute of tables names of blog's database (magic_quotes_gpc should be tured off). ------------------------------------------ "$sql = "select * from $tblUsers where login = '$login'"; if ( $login != $row['login'] ) $valid_user = 0; if ( $password != $row['password'] ) $valid_user = 0;" ------------------------------------------ 2) Remote File Inclusion (RFI) /includes/sessions.php?wb_class_dir=shell?