Luxbum 0.5.5 Auth Bypass via SQL Injection
Luxbum allows authentification using dotclear username and password via MySQL, while the default auth mechanism uses a md5 hash of the pass in a PHP file. If you trace all the code from login form to admin panel, you'll notice that user input isn't filtered in manager.php or mysql.inc.php. So if you use dotclear auth in luxbum, SQL injection is possible but, in order to bypass, we need to return at least one row to get it working and it has to be a dotclear admin. In dotclear, the table dc_user stores in the column 'user_super' the super admin status. If it's == 1 then the user is super-admin. Since the luxbum auth mechanism already fully accesses to dotclear users' data, exploiting is very easy and doesn't require the disclosure of dotclear database infos (DB name, username, pass, prefix etc.).