[eVuln] MD News Authentication Bypass and SQL Injection Vulnerabilities

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



New eVuln Advisory:
MD News Authentication Bypass and SQL Injection Vulnerabilities
http://evuln.com/vulns/120/summary.html

--------------------Summary----------------
eVuln ID: EV0120
Software: MD News
Sowtware's Web Site: http://www.matthewdingley.co.uk/
Versions: 1
Critical Level: Moderate
Type: Multiple Vulnerabilities
Class: Remote
Status: Unpatched. No reply from developer(s)
PoC/Exploit: Available
Solution: Not Available
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)

-----------------Description---------------
1. SQL Injection.

Vulnerable script: admin.php

Parameter id is not properly sanitized before being used in SQL query. This can be used to make any SQL query by injecting arbitrary SQL code.


2. Authentication Bypass.

"Administration Area" script has no any authentication. Any user can get access to administrator's area. (Just need to know script name)


--------------PoC/Exploit----------------------
Available at: http://evuln.com/vulns/120/exploit.html

--------------Solution---------------------
No Patch available.

--------------Credit-----------------------
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)


Regards,
Aliaksandr Hartsuyeu
http://evuln.com - Penetration Testing Services
.

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux