SQL Injection Auth Bypass in Bit 5 Blog

Summary

Vulnerability
SQL Injection Auth Bypass in Bit 5 Blog
Discovered
2006.01.14
Last Update
0 n/a
ID
EV0031
CVE
CVE-2006-0320
Risk Level
medium
Type
SQL Injection
Status
Unpatched
Vendor
n/a
Vulnerable Software
Bit 5 Blog (http://bit5blog.sourceforge.net/)
Version
8.01
PoC/Exploit
Available
Solution
Not available
Discovered by
Aliaksandr Hartsuyeu (eVuln.com)

Description

SQL Injection found in Bit 5 Blog (http://bit5blog.sourceforge.net/) script.

Vulnerable script: processlogin.php

Variables $_POST['username'] and $_POST['password'] are not properly sanitized before being used in a SQL query. This can be used to make any SQL query by injecting arbitrary SQL code and log in without password.

PoC/Exploit

Authentication bypass example (SQL Injection):

http://host/admin/index.php

User Name: a' or 1/*

Password: a' or 1/*

Solution.

Solution for "SQL Injection Auth Bypass in Bit 5 Blog" is not available. Check vendor's website for updates.