SQL Injection Auth Bypass in Bit 5 Blog
Summary
- Vulnerability
- SQL Injection Auth Bypass in Bit 5 Blog
- Discovered
- 2006.01.14
- Last Update
- 0 n/a
- ID
- EV0031
- CVE
- CVE-2006-0320
- Risk Level
- medium
- Type
- SQL Injection
- Status
- Unpatched
- Vendor
- n/a
- Vulnerable Software
- Bit 5 Blog (http://bit5blog.sourceforge.net/)
- Version
- 8.01
- PoC/Exploit
- Available
- Solution
- Not available
- Discovered by
- Aliaksandr Hartsuyeu (eVuln.com)
Description
SQL Injection found in Bit 5 Blog (http://bit5blog.sourceforge.net/) script.
Vulnerable script: processlogin.php
Variables $_POST['username'] and $_POST['password'] are not properly sanitized before being used in a SQL query. This can be used to make any SQL query by injecting arbitrary SQL code and log in without password.
PoC/Exploit
Authentication bypass example (SQL Injection):
http://host/admin/index.php
User Name: a' or 1/*
Password: a' or 1/*
Solution.
Solution for "SQL Injection Auth Bypass in Bit 5 Blog" is not available. Check vendor's website for updates.