ESMI PayPal Storefront SQL Injection Vulnerability
BID:12903
Info
ESMI PayPal Storefront SQL Injection Vulnerability
| Bugtraq ID: | 12903 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 26 2005 12:00AM |
| Updated: | Mar 26 2005 12:00AM |
| Credit: | Credited to Dcrab <[email protected]>. |
| Vulnerable: |
ESMI PayPal Storefront 1.7 |
| Not Vulnerable: | |
Discussion
ESMI PayPal Storefront SQL Injection Vulnerability
ESMI PayPal Storefront is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in as SQL query.
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
ESMI PayPal Storefront is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in as SQL query.
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
Exploit / POC
ESMI PayPal Storefront SQL Injection Vulnerability
No exploit is required.
The following proof of concepts were supplied:
http://www.example.com/hv/ecdis/pages.php?idpages='SQLINJECTION
http://www.example.com/hv/ecdis/products1.php?id=6&id2='SQLINJECTION&subcat=Asus&p=products1
No exploit is required.
The following proof of concepts were supplied:
http://www.example.com/hv/ecdis/pages.php?idpages='SQLINJECTION
http://www.example.com/hv/ecdis/products1.php?id=6&id2='SQLINJECTION&subcat=Asus&p=products1
Solution / Fix
ESMI PayPal Storefront SQL Injection Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.