lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20031216224515.11093.qmail@sf-www2-symnsj.securityfocus.com> Date: 16 Dec 2003 22:45:15 -0000 From: JeiAr <security@...ftech.org> To: bugtraq@...urityfocus.com Subject: Re:Re: SQL Injection Vuln In osCommerce 2.2-MS1 In-Reply-To: <20031215061530.20789.qmail@...www2-symnsj.securityfocus.com> This vulnerability also exists in the account_edit_process.php and pretty much anywhere else you can input data into the country field by altering the form. JeiAr >X-Mailer: MIME-tools 5.411 (Entity 5.404) >From: JeiAr <security@...ftech.org> >To: bugtraq@...urityfocus.com >Subject: RE: SQL Injection Vuln In osCommerce 2.2-MS1 > > > >Threw together a quick script that shop owners or admins can use to test whether or not they are vuln. Should be handy in cases where store owners are not sure what version they are running etc. > >http://www.gulftech.org/vuln/ossqlin.txt >