[原文]SQL injection vulnerability in DSLogin 1.0, with magic_quotes_gpc disabled, allows remote attackers to execute arbitrary SQL commands and bypass authentication via the $log_userid variable in (1) index.php and (2) admin/index.php.
DSLogin contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the index.php (or admin/index.php) script not properly sanitizing user-supplied input to the 'log_userid' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
Aliaksandr Hartsuyeu is credited with the discovery of this vulnerability.
DSPortal DSLogin 1.0
DSLogin is prone to multiple SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
This issue can be exploited through a web client.
The following proof of concept has been provided:
http://www.example.com/dslogin/index.php Username: ' or 1/* Password: any
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: email@example.com:firstname.lastname@example.org