Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12112
HistoryApr 10, 2006 - 12:00 a.m.

Shopweezle 2.0 multiple vuln.

2006-04-1000:00:00
vulners.com
14

Shopweezle 2.0 multiple vuln.

###############################################
Vuln. discovered by : r0t
Date: 9 april 2006
vendor:http://shopweezle.de/
affected versions:
ShopWeezle PERSONAL
ShopWeezle PROFESSIONAL
ShopWeezle PROFESSIONAL+
orginal advisory:
http://pridels.blogspot.com/2006/04/shopweezle-20-multiple-vuln.html
###############################################

Vuln. description:

  1. SQL injection vuln.

Shopweezle contains a flaws that allows a remote sql injection
attacks.Inputpassed to the "itemID","brandID","album" isn't properly
sanitised before
being used in a SQL query. This can be exploited to manipulate SQL queries
by injecting arbitrary SQL code.

examples:

/login.php?caller=xlink&url=detail.php&itemID=1[SQL]
/index.php?x=0&itemgr=1[SQL]
/index.php?caller=xlink&url=brand.php&brandID=1[SQL]
/memo.php?itemID=1[SQL]
/index.php?x=0&caller=xlink&url=gallery.php&album=1[SQL]

  1. Full Path Disclosure

An attacker can get full install path by testing SQL attack vuln.

  1. Possible Local File Include vuln.

Input passed to the "url" parameter in "index.php" isn't properly verified
before being used to include files. This can be exploited to include
arbitrary files from local resources.

###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/