[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] PHP Gift Registry 1.5.5 SQL Injection



On 2/24/2012 3:21 PM, ctruncer@xxxxxxxxxxxxxxxxxxxxxx wrote:
> You only gave them two days to respond?
>
>
> Chris
>
>
>
> On 24.02.2012 08:08, Thomas Richards wrote:
>> # Exploit Title: PHP Gift Registry 1.5.5 SQL Injection
>> # Date: 02/22/12
>> # Author: G13
>> # Software Link: https://sourceforge.net/projects/phpgiftreg/
>> # Version: 1.5.5
>> # Category: webapps (php)
>> #
>>
>> ##### Vulnerability #####
>>
>> The userid parameter in the users.php file is vulnerable to SQL 
>> Injection.
>>
>> A user must be signed in to exploit this.
>>
>> ##### Vendor Notification #####
>>
>> 02/22/12 - Vendor Notified
>> 02/24/12 - No response, disclosure
>>
>> ##### Exploit #####
>>
>> http://localhost/phpgiftreg/users.php?action=edit&userid=[SQLi]
>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
Pretty sure this project is dead the last update to it was made
2009-03-12 see http://sourceforge.net/projects/phpgiftreg/files/ ,
anyone using it at this point needs to switch to another
product.<http://sourceforge.net/tracker/?func=detail&aid=3491557&group_id=110846&atid=657564>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/