FreeWebshop 2.2.9 Cross Site Scripting & SQL Injection

2012.09.17
Credit: httpcs
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89
CWE-79

HTTPCS Advisory : HTTPCS98 Product : FreeWebshop Version : 2.2.9 Date : 2012-09-17 Criticality level : Highly Critical Description : A vulnerability has been discovered in FreeWebshop, which can be exploited by malicious people to conduct SQL injection attacks. Input passed via the 'searchfor' parameter to '/index.php' is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Page : /index.php Variables : page=browse&searchfor=[VulnHTTPCS] Type : SQLI Method : GET Solution : References : https://www.httpcs.com/advisory/httpcs98 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ Product : FreeWebshop Version : 2.2.9 Date : 2012-09-17 Criticality level : Highly Critical Description : A vulnerability has been discovered in FreeWebshop, which can be exploited by malicious people to conduct SQL injection attacks. Input passed via the 'prodprice' parameter to '/index.php' is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Page : /index.php Variables : page=cart&action=add&numprod=1&sub=Bestellen&prodid=2&prodprice=[VulnHTTPCS] Type : SQLI Method : GET Solution : References : https://www.httpcs.com/advisory/httpcs99 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ Product : FreeWebshop Version : 2.2.9 Date : 2012-09-17 Criticality level : Highly Critical Description : A vulnerability has been discovered in FreeWebshop, which can be exploited by malicious people to conduct SQL injection attacks. Input passed via the 'Text' parameter to '/index.php?page=cart&action=add' is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Page : /index.php?page=cart&action=add Variables : sub=Bestellen&prodprice=1234.56&numprod=1&prodid=1&Text=[VulnHTTPCS] Type : SQLI Method : POST Solution : References : https://www.httpcs.com/advisory/httpcs100 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ Product : FreeWebshop Version : 2.2.9 Date : 2012-09-17 Criticality level : Highly Critical Description : A vulnerability has been discovered in FreeWebshop, which can be exploited by malicious people to conduct SQL injection attacks. Input passed via the 'Color' parameter to '/index.php?page=cart&action=add' is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Page : /index.php?page=cart&action=add Variables : sub=Bestellen&prodprice=1234.56&numprod=1&prodid=1&Color=[VulnHTTPCS] Type : SQLI Method : POST Solution : References : https://www.httpcs.com/advisory/httpcs101 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ Product : FreeWebshop Version : 2.2.9 Date : 2012-09-17 Criticality level : Less Critical Description : A vulnerability has been discovered in FreeWebshop, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the 'redirect_to' parameter to '/setlang.php' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Page : /setlang.php Variables : lang=nl&redirect_to=[VulnHTTPCS] Type : XSS Method : GET Solution : References : https://www.httpcs.com/advisory/httpcs103 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ Twitter : http://twitter.com/HTTPCS_ Free web vulnerability scanner HTTPCS : https://www.httpcs.com/

References:

https://www.httpcs.com/advisory/httpcs98
http://twitter.com/HTTPCS
_


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top