top of page

Fruits-Bazar 2021 1.0 'recover_email' SQL Injection

Application Details

Fruits-Bazar is an eCommerce project developed using PHP, JavaScript, JQuery, and MySQL.


Fruits-Bazar is vulnerable to SQL injection.


A remote attacker could send specially crafted SQL statements using the 'recover_email' parameter, which could allow the attacker to view, add, modify or delete information in the back-end database.

POST /index.php
PAYLOAD -' (select load_file('\\\\\\olg')) '' AND (SELECT 6160 FROM(SELECT COUNT(*),CONCAT(0x7178627171,(SELECT (ELT(6160=6160,1))),0x7170767871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'Mvga'='Mvga&u_pass_recover=Recover Password


By turning this into a traffic file and matching rule, we are able to detect attempts to influence the vulnerable parameter with SQL injections.


Idappcom has created signature 8022835 along with a traffic file.


Traffic IQ

If you are concerned that your business may be at risk of this vulnerability, or others, why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here:


bottom of page