what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

mall23.txt

mall23.txt
Posted Sep 23, 2005
Authored by SmOk3

Mall23 is vulnerable to a SQL injection attack in AddItem.asp. Versions below 4.11 are susceptible.

tags | exploit, sql injection, asp
SHA-256 | fcacdb9af24ecc55c9cc26e48a19e53f97a1a239b9986890b7f7cdab5ecf1c30

mall23.txt

Change Mirror Download
ORIGINAL LINK: http://systemsecure.org/ssforum/viewtopic.php?t=277

#-------------------------------------
# Ref: SS#21092005
# SYSTEMSECURE.ORG - Advisory/Exploit
#
# * PUBLIC ADVISORY *
#
#-------------------------------------

» Software: Mall23

» Link: http://www.mall23.com/

» Attacks: SQL Injection

» Discovered by: David Sopas Ferreira aka SmOk3
[david at systemsecure.org]

» GoogleDork: "Powered by Mall23.com"


-- ! Description !--

Vendor product description: " Mall23 provides business-focused eCommerce
products to effectively and measurably
maximise your investment. Includes unique and powerful features specifically
designed for Internet Hosting companies.
Build your revenue and increase client confidence! Mall23 also generates an
immediate return on your investment -
- several times over. Discover an all-inclusive package that needs no
customizations or add-ons. "

Mall23, ASP e-commerce script, is vulnerable to SQL Injection attack using
POST method. Impact an unauthenticated
attacker may execute arbitrary SQL statements on the vulnerable system. This
may compromise the integrity of your
database and expose sensitive information.


» Affected file: AddItem.asp - variable: $idOption_Dropdown_2

» Proof of Concept (exploit):

<form
action="http://siterunning_mall23.com:80/m23Basket/AddItem.asp?idProduct=6"
method="POST">
<input type="hidden" name="idOption_Dropdown_2" value="'[SQL INJECTION]">
<input type="Submit" name="submit" value="Test Exploit">
</form>


-- ! Solution !--

Vendor was contacted and it fixed the problem in the same day it was
reported. Upgrade to version 4.11 available
at http://www.mall23.com .


<base64>Rm9y52EgUG9ydHVnYWw=</base64>

# -EOF-
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close