[UNIX] Information Disclosure and SQL Injection in iGeneric eShop

From: SecuriTeam (support_at_securiteam.com)
Date: 02/24/05

  • Next message: SecuriTeam: "[TOOL] Vuurmuur - IPTables Frontend"
    To: list@securiteam.com
    Date: 24 Feb 2005 17:32:58 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.
    http://www.securiteam.com/mailinglist.html

    - - - - - - - - -

      Information Disclosure and SQL Injection in iGeneric eShop
    ------------------------------------------------------------------------

    SUMMARY

    "Create a robust full featured online shop within minutes with
    <http://www.igeneric.co.uk/display_resources/resource1.html> iG Shop. iG
    Shop is a powerful PHP MySQL based shopping cart system that enables you
    create full featured online shop very quickly."

    Multiple SQL Injection vulnerabilities were discovered in iGeneric eShop
    software, allowing a remote attacker to modify the product's existing SQL
    statements with his own arbitrary SQL statements.

    DETAILS

    Vulnerable Systems:
     * iGeneric eShop version 1.2

    Proof of Concept:
    http://www.victimsite.com/page.php?page_type=catalog_products&type_id[]=2&
    SESSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type=catalog_products&cats='

    http://www.victimsite.com/page.php?page_type=catalog_products&type_id[]=2&
    SESSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type3=catalog_products&search=1&
    l_price='&u_price=1&Submit=Search

    http://www.victimsite.com/page.php?page_type=catalog_products&type_id[]=2&
    SESSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type3=catalog_products&
    search=1&l_price=1&u_price='&Submit=Search

    Disclosure Timeline:
     * 10/02/2005 - Vulnerabilities found
     * 14/02/2005 - Vendor informed.
     * 20/02/2005 - Public notice.

    ADDITIONAL INFORMATION

    The information has been provided by <mailto:johnc@nobytes.com> John
    Cobb.
    The original article can be found at: <http://www.nobytes.com>
    http://www.nobytes.com

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[TOOL] Vuurmuur - IPTables Frontend"

    Relevant Pages

    • [UNIX] Joomla BSQ Sitestats Component Multiple Vulnerabilities
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Secunia Research has discovered some vulnerabilities in the BSQ ... SQL query. ... Successful exploitation requires that "register_globals" is enabled. ...
      (Securiteam)
    • [NEWS] TorrentTrader Multiple SQL Injection Vulnerabilities
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... TorrentTrader Multiple SQL Injection Vulnerabilities ...
      (Securiteam)
    • [UNIX] CMS Mundo SQL Injection and File Upload Vulnerabilities
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... CMS Mundo SQL Injection and File Upload Vulnerabilities ... Successful exploitation requires access to the administration section. ...
      (Securiteam)
    • [NT] Multiple Vulnerabilities in Comersus BackOffice Lite
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... of ASP scripts creating an online shopping cart. ... existing SQL statements and to cause cross site scripting vulnerabilities. ...
      (Securiteam)
    • [UNIX] DeluxeBB SQL Injection and File Inclusion Vulnerabilities
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... DeluxeBB SQL Injection and File Inclusion Vulnerabilities ... Successful exploitation requires that "register_globals" is enabled. ...
      (Securiteam)