CVE-2021-35456
📋 TL;DR
Online Pet Shop We App 1.0 contains SQL injection and shell upload vulnerabilities that allow attackers to execute arbitrary SQL commands and upload malicious files. This affects all installations of version 1.0 of this specific PHP web application. Attackers can potentially gain full control of affected systems.
💻 Affected Systems
- Online Pet Shop We App
📦 What is this software?
Online Pet Shop Web Application by Online Pet Shop Web Application Project
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise including database exfiltration, remote code execution, and persistent backdoor installation leading to data theft, ransomware deployment, or system destruction.
Likely Case
Database compromise with sensitive data exposure (customer information, payment details), website defacement, and unauthorized administrative access.
If Mitigated
Limited impact with proper input validation, file upload restrictions, and network segmentation preventing lateral movement.
🎯 Exploit Status
Public exploit code available on Packet Storm Security demonstrating both SQL injection and shell upload capabilities.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch exists. Recommended action is to upgrade to a different, maintained e-commerce platform or implement custom security fixes.
🔧 Temporary Workarounds
Implement Input Validation
allAdd parameterized queries and input sanitization to prevent SQL injection
Modify PHP files to use prepared statements with PDO or mysqli
Restrict File Uploads
allImplement strict file upload validation including file type checking, size limits, and storage outside web root
Add file validation in upload handling scripts: check extensions, MIME types, and rename uploaded files
🧯 If You Can't Patch
- Isolate the application in a DMZ with strict network segmentation and outbound traffic filtering
- Implement a web application firewall (WAF) with SQL injection and file upload protection rules
🔍 How to Verify
Check if Vulnerable:
Check if application is Online Pet Shop We App version 1.0 by examining source code or version files. Test for SQL injection using parameter manipulation in product search or user input fields.
Check Version:
Check PHP files for version comments or examine database configuration files for application identification
Verify Fix Applied:
Test SQL injection attempts return error messages or are blocked. Attempt to upload non-image files should be rejected. Review code for prepared statements and file validation.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL syntax errors in application logs
- File upload attempts with suspicious extensions (.php, .phtml, .exe)
- Multiple failed login attempts from single IP
Network Indicators:
- Unusual database queries from web server
- Outbound connections from web server to unknown IPs
- Large data exfiltration from database
SIEM Query:
source="web_logs" AND (message="*sql*error*" OR message="*upload*" AND NOT message="*.jpg" OR message="*.png")
🔗 References
- https://packetstormsecurity.com/files/163282/Online-Pet-Shop-We-App-1.0-SQL-Injection-Shell-Upload.html
- https://www.sourcecodester.com/php/14839/online-pet-shop-we-app-using-php-and-paypal-free-source-code.html
- https://packetstormsecurity.com/files/163282/Online-Pet-Shop-We-App-1.0-SQL-Injection-Shell-Upload.html
- https://www.sourcecodester.com/php/14839/online-pet-shop-we-app-using-php-and-paypal-free-source-code.html