fipsShop Multiple SQL Injection Vulnerabilities
BID:21289
Info
fipsShop Multiple SQL Injection Vulnerabilities
| Bugtraq ID: | 21289 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Nov 25 2006 12:00AM |
| Updated: | Nov 28 2006 07:49PM |
| Credit: | Aria-Security is credited with discovering these issues. |
| Vulnerable: |
fipsASP fipsShop 0 |
| Not Vulnerable: | |
Discussion
fipsShop Multiple SQL Injection Vulnerabilities
fipsShop is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
fipsShop is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
Exploit / POC
fipsShop Multiple SQL Injection Vulnerabilities
An attacker can exploit these issues via a web client.
The following URIs demonstrate these issues:
http://www.example.com/path/index.asp?cat=[SQL INJECTION]
http://www.example.com/path/index.asp?page=detail&did=[SQL INJECTION]
An attacker can exploit these issues via a web client.
The following URIs demonstrate these issues:
http://www.example.com/path/index.asp?cat=[SQL INJECTION]
http://www.example.com/path/index.asp?page=detail&did=[SQL INJECTION]
Solution / Fix
fipsShop Multiple SQL Injection Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].