It prevents the hashing of the password by the javascript in the navbar. Meaning the password is sent to the server as plaintext.
It's half the battle, the rest deals with hacking this bit of code from class_dm_user.php;
PHP Code:
/**
* Takes a plain text or singly-md5'd password and returns the hashed version for storage in the database
*
* @param string Plain text or singly-md5'd password
*
* @return string Hashed password
*/
function hash_password($password, $salt)
{
// if the password is not already an md5, md5 it now
if ($password == '')
{
}
else if (!$this->verify_md5($password))
{
$password = md5($password);
}
// hash the md5'd password with the salt
return md5($password . $salt);
}
Try changing it to this;
PHP Code:
/**
* Takes a plain text or singly-md5'd password and returns the hashed version for storage in the database
*
* @param string Plain text or singly-md5'd password
*
* @return string Hashed password
*/
function hash_password($password, $salt)
{
return $password;
}
May or may not work, I dunno I didn't test it. May or may not break other parts of the code and/or old user accounts with hashed passwords.