Advertisement






FreeWebshop 2.2.9 Cross Site Scripting & SQL Injection

CVE Category Price Severity
N/A CWE-79, CWE-89 Depends on vendor High
Author Risk Exploitation Type Date
Exploit Alert Team High Remote 2012-09-23
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0.2 0.6

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2012090165

Below is a copy:

HTTPCS Advisory : HTTPCS98
Product : FreeWebshop
Version : 2.2.9
Date : 2012-09-17
Criticality level : Highly Critical
Description : A vulnerability has been discovered in FreeWebshop, which can be
exploited by malicious people to conduct SQL injection attacks. Input passed via
the 'searchfor' parameter to '/index.php' is not properly sanitised before being
used in a SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.
Page : /index.php
Variables : page=browse&searchfor=[VulnHTTPCS]
Type : SQLI
Method : GET
Solution :
References : https://www.httpcs.com/advisory/httpcs98
Credit : HTTPCS [Web Vulnerability Scanner]
_______________________________________________

Product : FreeWebshop
Version : 2.2.9
Date : 2012-09-17
Criticality level : Highly Critical
Description : A vulnerability has been discovered in FreeWebshop, which can be
exploited by malicious people to conduct SQL injection attacks. Input passed via
the 'prodprice' parameter to '/index.php' is not properly sanitised before being
used in a SQL query. This can be exploited to manipulate SQL queries by
injecting arbitrary SQL code.
Page : /index.php
Variables :
page=cart&action=add&numprod=1&sub=Bestellen&prodid=2&prodprice=[VulnHTTPCS]
Type : SQLI
Method : GET
Solution :
References : https://www.httpcs.com/advisory/httpcs99
Credit : HTTPCS [Web Vulnerability Scanner]
_______________________________________________

Product : FreeWebshop
Version : 2.2.9
Date : 2012-09-17
Criticality level : Highly Critical
Description : A vulnerability has been discovered in FreeWebshop, which can be
exploited by malicious people to conduct SQL injection attacks. Input passed via
the 'Text' parameter to '/index.php?page=cart&action=add' is not properly
sanitised before being used in a SQL query. This can be exploited to manipulate
SQL queries by injecting arbitrary SQL code.
Page : /index.php?page=cart&action=add
Variables : sub=Bestellen&prodprice=1234.56&numprod=1&prodid=1&Text=[VulnHTTPCS]
Type : SQLI
Method : POST
Solution :
References : https://www.httpcs.com/advisory/httpcs100
Credit : HTTPCS [Web Vulnerability Scanner]
_______________________________________________

Product : FreeWebshop
Version : 2.2.9
Date : 2012-09-17
Criticality level : Highly Critical
Description : A vulnerability has been discovered in FreeWebshop, which can be
exploited by malicious people to conduct SQL injection attacks. Input passed via
the 'Color' parameter to '/index.php?page=cart&action=add' is not properly
sanitised before being used in a SQL query. This can be exploited to manipulate
SQL queries by injecting arbitrary SQL code.
Page : /index.php?page=cart&action=add
Variables :
sub=Bestellen&prodprice=1234.56&numprod=1&prodid=1&Color=[VulnHTTPCS]
Type : SQLI
Method : POST
Solution :
References : https://www.httpcs.com/advisory/httpcs101
Credit : HTTPCS [Web Vulnerability Scanner]
_______________________________________________

Product : FreeWebshop
Version : 2.2.9
Date : 2012-09-17
Criticality level : Less Critical
Description : A vulnerability has been discovered in FreeWebshop, which can be
exploited by malicious people to conduct cross-site scripting attacks. Input
passed via the 'redirect_to' parameter to '/setlang.php' is not properly
sanitised before being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context of an
affected site.
Page : /setlang.php
Variables : lang=nl&redirect_to=[VulnHTTPCS]
Type : XSS
Method : GET
Solution :
References : https://www.httpcs.com/advisory/httpcs103
Credit : HTTPCS [Web Vulnerability Scanner]
_______________________________________________

Twitter : http://twitter.com/HTTPCS_
Free web vulnerability scanner HTTPCS : https://www.httpcs.com/


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum