HTTPCS Advisory : HTTPCS98
Product : FreeWebshop
Version : 2.2.9
Date : 2012-09-17
Criticality level : Highly Critical
Description : A vulnerability has been discovered in FreeWebshop, which can be
exploited by malicious people to conduct SQL injection attacks. Input passed via
the 'searchfor' parameter to '/index.php' is not properly sanitised before being
used in a SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.
Page : /index.php
Variables : page=browse&searchfor=[VulnHTTPCS]
Type : SQLI
Method : GET
Solution :
References : https://www.httpcs.com/advisory/httpcs98
Credit : HTTPCS [Web Vulnerability Scanner]
_______________________________________________
Product : FreeWebshop
Version : 2.2.9
Date : 2012-09-17
Criticality level : Highly Critical
Description : A vulnerability has been discovered in FreeWebshop, which can be
exploited by malicious people to conduct SQL injection attacks. Input passed via
the 'prodprice' parameter to '/index.php' is not properly sanitised before being
used in a SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.
Page : /index.php
Variables :
page=cart&action=add&numprod=1&sub=Bestellen&prodid=2&prodprice=[VulnHTTPCS]
Type : SQLI
Method : GET
Solution :
References : https://www.httpcs.com/advisory/httpcs99
Credit : HTTPCS [Web Vulnerability Scanner]
_______________________________________________
Product : FreeWebshop
Version : 2.2.9
Date : 2012-09-17
Criticality level : Highly Critical
Description : A vulnerability has been discovered in FreeWebshop, which can be
exploited by malicious people to conduct SQL injection attacks. Input passed via
the 'Text' parameter to '/index.php?page=cart&action=add' is not properly
sanitised before being used in a SQL query. This can be exploited to manipulate
SQL queries by injecting arbitrary SQL code.
Page : /index.php?page=cart&action=add
Variables : sub=Bestellen&prodprice=1234.56&numprod=1&prodid=1&Text=[VulnHTTPCS]
Type : SQLI
Method : POST
Solution :
References : https://www.httpcs.com/advisory/httpcs100
Credit : HTTPCS [Web Vulnerability Scanner]
_______________________________________________
Product : FreeWebshop
Version : 2.2.9
Date : 2012-09-17
Criticality level : Highly Critical
Description : A vulnerability has been discovered in FreeWebshop, which can be
exploited by malicious people to conduct SQL injection attacks. Input passed via
the 'Color' parameter to '/index.php?page=cart&action=add' is not properly
sanitised before being used in a SQL query. This can be exploited to manipulate
SQL queries by injecting arbitrary SQL code.
Page : /index.php?page=cart&action=add
Variables :
sub=Bestellen&prodprice=1234.56&numprod=1&prodid=1&Color=[VulnHTTPCS]
Type : SQLI
Method : POST
Solution :
References : https://www.httpcs.com/advisory/httpcs101
Credit : HTTPCS [Web Vulnerability Scanner]
_______________________________________________
Product : FreeWebshop
Version : 2.2.9
Date : 2012-09-17
Criticality level : Less Critical
Description : A vulnerability has been discovered in FreeWebshop, which can be
exploited by malicious people to conduct cross-site scripting attacks. Input
passed via the 'redirect_to' parameter to '/setlang.php' is not properly
sanitised before being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context of an
affected site.
Page : /setlang.php
Variables : lang=nl&redirect_to=[VulnHTTPCS]
Type : XSS
Method : GET
Solution :
References : https://www.httpcs.com/advisory/httpcs103
Credit : HTTPCS [Web Vulnerability Scanner]
_______________________________________________
Twitter : http://twitter.com/HTTPCS_
Free web vulnerability scanner HTTPCS : https://www.httpcs.com/