exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

mall23.txt

mall23.txt
Posted Sep 23, 2005
Authored by SmOk3

Mall23 is vulnerable to a SQL injection attack in AddItem.asp. Versions below 4.11 are susceptible.

tags | exploit, sql injection, asp
SHA-256 | fcacdb9af24ecc55c9cc26e48a19e53f97a1a239b9986890b7f7cdab5ecf1c30

mall23.txt

Change Mirror Download
ORIGINAL LINK: http://systemsecure.org/ssforum/viewtopic.php?t=277

#-------------------------------------
# Ref: SS#21092005
# SYSTEMSECURE.ORG - Advisory/Exploit
#
# * PUBLIC ADVISORY *
#
#-------------------------------------

» Software: Mall23

» Link: http://www.mall23.com/

» Attacks: SQL Injection

» Discovered by: David Sopas Ferreira aka SmOk3
[david at systemsecure.org]

» GoogleDork: "Powered by Mall23.com"


-- ! Description !--

Vendor product description: " Mall23 provides business-focused eCommerce
products to effectively and measurably
maximise your investment. Includes unique and powerful features specifically
designed for Internet Hosting companies.
Build your revenue and increase client confidence! Mall23 also generates an
immediate return on your investment -
- several times over. Discover an all-inclusive package that needs no
customizations or add-ons. "

Mall23, ASP e-commerce script, is vulnerable to SQL Injection attack using
POST method. Impact an unauthenticated
attacker may execute arbitrary SQL statements on the vulnerable system. This
may compromise the integrity of your
database and expose sensitive information.


» Affected file: AddItem.asp - variable: $idOption_Dropdown_2

» Proof of Concept (exploit):

<form
action="http://siterunning_mall23.com:80/m23Basket/AddItem.asp?idProduct=6"
method="POST">
<input type="hidden" name="idOption_Dropdown_2" value="'[SQL INJECTION]">
<input type="Submit" name="submit" value="Test Exploit">
</form>


-- ! Solution !--

Vendor was contacted and it fixed the problem in the same day it was
reported. Upgrade to version 4.11 available
at http://www.mall23.com .


<base64>Rm9y52EgUG9ydHVnYWw=</base64>

# -EOF-
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close