Lucene search

K

phprpg-sql.txt

🗓️ 18 Dec 2007 00:00:00Reported by Michael BrooksType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 23 Views

Vulnerability in phprpg 0.8.0 allows SQL injection and Session Information Disclosur

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`By Michael Brooks  
Vulneralbity: Sql Injection and Session Information Disclosure.   
Homepage:http://sourceforge.net/projects/phprpg/  
Verison affected 0.8.0  
  
There are two flaws that affect this applcation. A nearly vinnella login bypass issues affects phprpg. If magic_qutoes_gpc=off then this will login an attacker as the administrator using this:  
username:1'or 1=1 limit 1/*  
password:1  
Keep in mind that magic_quotes_gpc is being removed in php6!  
  
The second flaw allows an attacker to steal any session registered by phprpg by navigating to this directory:  
http://localhost/phpRPG-0.8.0/tmp/  
This is because phprpg has manually changed the directory using session_save_path() which is called in init.php on line 49.   
  
Peace  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
18 Dec 2007 00:00Current
7.4High risk
Vulners AI Score7.4
23
.json
Report