Lucene search

K
packetstormCraCkErPACKETSTORM:170545
HistoryJan 17, 2023 - 12:00 a.m.

BootCommerce 3.2.1 SQL Injection

2023-01-1700:00:00
CraCkEr
packetstormsecurity.com
161
bootcommerce 3.2.1
sql injection
database access
vulnerability
unauthorized access
sensitive data
application crash
revenue loss
company reputation
`┌┌───────────────────────────────────────────────────────────────────────────────────────┐  
││ C r a C k E r ┌┘  
┌┘ T H E C R A C K O F E T E R N A L M I G H T ││  
└───────────────────────────────────────────────────────────────────────────────────────┘┘  
  
┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐  
┌┌───────────────────────────────────────────────────────────────────────────────────────┐  
┌┘ [ Vulnerability ] ┌┘  
└───────────────────────────────────────────────────────────────────────────────────────┘┘  
: Author : CraCkEr :  
│ Website : https://www.mrplugins.it/bootcommerce/ │  
│ Vendor : MrPlugins │  
│ Software : BootCommerce 3.2.1 │  
│ Vuln Type: SQL Injection │  
│ Impact : Database Access │  
│ │  
│────────────────────────────────────────────────────────────────────────────────────────│  
│ ┌┘  
└───────────────────────────────────────────────────────────────────────────────────────┘┘  
: :  
│ Release Notes: │  
│ ═════════════ │  
│ │  
│ SQL injection attacks can allow unauthorized access to sensitive data, modification of │  
│ data and crash the application or make it unavailable, leading to lost revenue and │  
│ damage to a company's reputation. │  
│ │  
┌┌───────────────────────────────────────────────────────────────────────────────────────┐  
┌┘ ┌┘  
└───────────────────────────────────────────────────────────────────────────────────────┘┘  
  
Greets:  
  
The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL   
  
CryptoJob (Twitter) twitter.com/CryptozJob  
  
┌┌───────────────────────────────────────────────────────────────────────────────────────┐  
┌┘ © CraCkEr 2023 ┌┘  
└───────────────────────────────────────────────────────────────────────────────────────┘┘  
  
Path: /bootcommerce/content/products/Books/?p=1&prc=5,12&of=false  
  
GET parameter 'prc' is vulnerable to SQLI  
  
https://www.target.com/bootcommerce/content/products/Books/?p=1&prc=5,12[Inject-HERE]&of=false  
  
  
[-] Done  
`