Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:11660
HistoryMar 02, 2006 - 12:00 a.m.

NZ Ecommerce SQL&XSS vuln.

2006-03-0200:00:00
vulners.com
18

Vuln. discovered by : r0t
Date: 2 march 2006
vendor: www.digitalbuilder.co.nz/Product_Code_NZEcommerce.asp
affected version: latest
Orginal advisory: http://pridels.blogspot.com/2006/03/nz-ecommerce-sqlxss-vuln.html

1.XSS
Input passed to the "action" parameter in "index.php" isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
2. SQL
NZ Ecommerce contains a flaw that allows a remote sql injection attacks.Input passed to the "informationID" ,"ParentCategory"parameter in "index.php" isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code

POC.

/index.php?action=Information&informationID=[SQL]
/index.php?action=DisplayOverviewproduct&ParentCategory=[SQL]

Solution:
Edit the source code to ensure that input is properly sanitised.