header-logo
Suggest Exploit
vendor:
AuthPhp
by:
x0r
7.5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: AuthPhp
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE: N/A
CPE: a:frankmancuso:authphp:1.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

AuthPhp 1.0 Auth Bypass

AuthPhp 1.0 is vulnerable to an authentication bypass vulnerability due to improper input validation. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with the ' or '1=1' payload to the login.php page. This will bypass the authentication process and allow the attacker to gain access to the application.

Mitigation:

Input validation should be performed on all user-supplied data to ensure that it is valid and expected. Additionally, authentication should be performed using a secure authentication mechanism such as a one-time password or two-factor authentication.
Source

Exploit-DB raw data:

#########################################################################################
[0x01] Informations:

Name           : AuthPhp 1.0
Download       :
http://frankmancuso.ca/downloads/authphp/authphp-stable-1.0.zip
Vulnerability  : Auth Bypass
Author         : x0r
Contact        : andry2000@hotmail.it
Notes          : Proud to be Italian
#########################################################################################
[0x02] Bug:

Bugged file is /[path]/login.php

[Code]
{
	$username = $_POST['username'];
	$passwd = $_POST['passwd'];
	
	// Call mysql class
	$db = new db;
	$db->connect();
	$sql = "SELECT * FROM users WHERE username='$username' &&
password='$passwd' ";
[/code]

#########################################################################################
[0x03] Exploit:

Exploit: ' or '1=1

########################################################################################

# milw0rm.com [2009-02-10]