New eVuln Advisory: WebspotBlogging Authentication Bypass Vulnerability http://evuln.com/vulns/41/summary.html --------------------Summary---------------- Software: WebspotBlogging Sowtware's Web Site: http://www.webspot.co.uk/ Versions: 3.0 Critical Level: Dangerous Type: SQL Injection Class: Remote Status: Unpatched Exploit: Available Solution: Not Available Discovered by: Aliaksandr Hartsuyeu (eVuln.com) eVuln ID: EV0041 -----------------Description--------------- Vulnerable script: login.php Variable $_POST[username] isn't properly sanitized before being used in a SQL query. This can be used to make any SQL query by injecting arbitrary SQL code. Condition: gpc_magic_quotes - off Administrator has an ability to import themes using php code insertion from Admin Control Panel. System access is possible. --------------Exploit---------------------- Available at: http://evuln.com/vulns/41/exploit.html SQL Injection Example: Link: http://host/webspot/login.php Username: aaaa' union select 1,2,3,1,1,6, 7/* Password: any --------------Solution--------------------- No Patch available. --------------Credit----------------------- Discovered by: Aliaksandr Hartsuyeu (eVuln.com)