exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

mall23.txt

mall23.txt
Posted Sep 23, 2005
Authored by SmOk3

Mall23 is vulnerable to a SQL injection attack in AddItem.asp. Versions below 4.11 are susceptible.

tags | exploit, sql injection, asp
SHA-256 | fcacdb9af24ecc55c9cc26e48a19e53f97a1a239b9986890b7f7cdab5ecf1c30

mall23.txt

Change Mirror Download
ORIGINAL LINK: https://systemsecure.org/ssforum/viewtopic.php?t=277

#-------------------------------------
# Ref: SS#21092005
# SYSTEMSECURE.ORG - Advisory/Exploit
#
# * PUBLIC ADVISORY *
#
#-------------------------------------

» Software: Mall23

» Link: https://www.mall23.com/

» Attacks: SQL Injection

» Discovered by: David Sopas Ferreira aka SmOk3
[david at systemsecure.org]

» GoogleDork: "Powered by Mall23.com"


-- ! Description !--

Vendor product description: " Mall23 provides business-focused eCommerce
products to effectively and measurably
maximise your investment. Includes unique and powerful features specifically
designed for Internet Hosting companies.
Build your revenue and increase client confidence! Mall23 also generates an
immediate return on your investment -
- several times over. Discover an all-inclusive package that needs no
customizations or add-ons. "

Mall23, ASP e-commerce script, is vulnerable to SQL Injection attack using
POST method. Impact an unauthenticated
attacker may execute arbitrary SQL statements on the vulnerable system. This
may compromise the integrity of your
database and expose sensitive information.


» Affected file: AddItem.asp - variable: $idOption_Dropdown_2

» Proof of Concept (exploit):

<form
action="https://siterunning_mall23.com:80/m23Basket/AddItem.asp?idProduct=6"
method="POST">
<input type="hidden" name="idOption_Dropdown_2" value="'[SQL INJECTION]">
<input type="Submit" name="submit" value="Test Exploit">
</form>


-- ! Solution !--

Vendor was contacted and it fixed the problem in the same day it was
reported. Upgrade to version 4.11 available
at https://www.mall23.com .


<base64>Rm9y52EgUG9ydHVnYWw=</base64>

# -EOF-
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close