In this Section

Security Advisory – PHP Blog Insert Authentication Security Bypass


Sense of Security – Security Advisory – SOS-11-002

Release Date. 28-Feb-2011
Last Update.
Vendor Notification Date. 14-Oct-2010
Product. PHP Blog Insert
Platform. Independent
Affected versions. All releases up to and including version 1.0.2
Severity Rating. High
Impact. Authentication security bypass
Attack Vector. Remote without authentication
Solution Status. No solution currently exists for this vulnerability
CVE reference. CVE – Not yet assigned



PHP Blog Insert is a simple blog engine designed to be inserted into an existing web site or application. It is written in PHP and uses a MySQL backend. The application is vulnerable to an authentication bypass attack due to flawed and predictable access control and session management logic. The application assumes a user is authenticated as an administrator if a cookie is present within a web browser that is named the MD5 hash of the text string “admin”. Successful exploitation of this vulnerability will result in an attacker gaining access to the administration functionality of the application without the use of valid credentials.


The software can be obtained from:


Proof of Concept.

Set a cookie within your browser for the appropriate path and domain of the vulnerable application with the name “21232f297a57a5a743894a0e4a801fc3” and any value.

Navigate to a page that contains restricted administration functionality within the application such as add_entry.php or register.php.



The vendor has not responded to our repeated email notifications and a private blog post on the author’s blog.


An updated release of PHP Blog Insert that corrects this vulnerability is not available.


Discovered by.

Sense of Security Labs.