Zoki Catalog SQL Injection

2009.06.20
Credit: SmOk3
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

Ref. [DSF-02-2009] - Zoki Catalog SQL Injection Vendor: Zoki Soft (www.zokisoft.com) Status: Patched by vendor Original advisory: http://www.davidsopas.com/2009/06/15/zoki-catalog-sql-injection/ Zoki Catalog Smart Catalog is unique and convenient software. It is designed for many purposes whether you want to create blog, product catalog, classifieds, events, jobs or many others. This software gives you opportunity to create general categories and unlimited number of subcategories, create static pages, upload images, rate and comment listings. The Smart Catalog has SEO optimized URLs, RSS feeds and fast indexed with major search engines. Description This PHP based catalog is vulnerable to SQL Injection on search form. Injecting a quote mark will break the SQL query and even provide sensitive database information that could help a malicious user to complete and enter a valid SQL injection query. Impact A malicious user could manipulate SQL queries by injecting arbitrary SQL code and return private information. Time-line June 3, 2009 - Reported to Zoki Soft June 13, 2009 - Reply from vendor June 15, 2009 - Vendor fixed it

Referencje:

http://www.securityfocus.com/archive/1/archive/1/504311/100/0/threaded
http://www.davidsopas.com/2009/06/15/zoki-catalog-sql-injection/
http://secunia.com/advisories/35476


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top