[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] [HTTPCS] FreeWebshop 'prodprice' Remote SQL Injection Vulnerability
- To: "full-disclosure@xxxxxxxxxxxxxxxxx" <full-disclosure@xxxxxxxxxxxxxxxxx>
- Subject: [Full-disclosure] [HTTPCS] FreeWebshop 'prodprice' Remote SQL Injection Vulnerability
- From: HTTPCS <contact@xxxxxxxxxx>
- Date: Mon, 17 Sep 2012 10:50:29 +0200 (CEST)
HTTPCS Advisory : HTTPCS99
Product : FreeWebshop
Version : 2.2.9
Date : 2012-09-17
Criticality level : Highly Critical
Description : A vulnerability has been discovered in FreeWebshop, which can be
exploited by malicious people to conduct SQL injection attacks. Input passed via
the 'prodprice' parameter to '/index.php' is not properly sanitised before being
used in a SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.
Page : /index.php
Variables :
page=cart&action=add&numprod=1&sub=Bestellen&prodid=2&prodprice=[VulnHTTPCS]
Type : SQLI
Method : GET
Solution :
References : https://www.httpcs.com/advisory/httpcs99
Credit : HTTPCS [Web Vulnerability Scanner]
_______________________________________________
Twitter : http://twitter.com/HTTPCS_
Free web vulnerability scanner HTTPCS : https://www.httpcs.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/