SQL injection vulnerability in Energine

Vulnerability ID: HTB22783
Reference: http://www.htbridge.ch/advisory/sql_injection_vulnerability_in_energine.html
Product: Energine
Vendor: Energine ( http://www.memht.com/ )
Vulnerable Version: 2.3.8 and probably prior versions
Vendor Notification: 28 December 2010
Vulnerability Type: SQL Injection
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: Medium
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)

Vulnerability Details:
The vulnerability exists due to failure in the "core/modules/shop/components/ProductList.class.php" script to properly sanitize user-supplied input in "product" variable. Attacker can alter queries to the application SQL database, execute arbitrary queries to the database, compromise the application, access or modify sensitive data, or exploit various vulnerabilities in the underlying SQL database.

Attacker can use browser to exploit this vulnerability. The following PoC is available:

Relevant Pages

  • Jupiter CMS 1.1.5 Multiple Vulnerabilities
    ... against SQL Injection attacks) in several SQL request. ... is that the script do not check for file extensions when a user upload ... Risk level: Medium ... simple poc illustrate how an attacker can exploit this vulnerability: ...
  • RE: mapping vulnerabilities into high medium low risk
    ... This is the best approach in my opinion; Let the client decide what is ... high, medium or low for him, because, now matter how much we know about ... clients will always know their business better. ... HIGH - If the vulnerability could affect the whole organization (main ...
  • HTB22790: XSS in Pivotx
    ... Vulnerability Type: XSS ... Risk level: Medium ... Vulnerability Details: ...
  • HTB22995: XSS in Ajax Chat
    ... Vendor Notification: 10 May 2011 ... Vulnerability Type: XSS ... Risk level: Medium ...
  • HTB22792: XSS in Pixelpost
    ... Vulnerability Type: XSS ... Risk level: Medium ... Vulnerability Details: ...