[原文]SQL injection vulnerability in admin/processlogin.php in Bit 5 Blog 8.01 allows remote attackers to execute arbitrary SQL commands and bypass authentication via the (1) username and (2) password parameter.
Bit 5 Blog processlogin.php Multiple Field SQL Injection
Remote / Network Access
Loss of Confidentiality,
Loss of Integrity
Bit 5 Blog contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the processlogin.php script not properly sanitizing user-supplied input to the 'username' and 'password' variables. This may allow an attacker to inject or manipulate SQL queries in the back-end database.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.