lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <AANLkTime4yiAuAopsPMihUS0y6_Vs_zVogJJUovT9Nn4@mail.gmail.com> Date: Mon, 31 Jan 2011 10:35:15 +0100 From: Andrea Fabrizi <andrea.fabrizi@...il.com> To: bugtraq@...urityfocus.com, webappsec@...urityfocus.com Subject: VirtueMart eCommerce for Joomla <= 1.1.6 Blind SQL Injection ************************************************************** Application: VirtueMart Version affected: <= 1.1.6 Website: http://www.virtuemart.net/ Discovered By: Andrea Fabrizi Email: andrea.fabrizi@...il.com Web: http://www.andreafabrizi.it Vuln: Blind SQL Injection ************************************************************** Blind SQL Injection found in "search_category" parameter. Example: http://127.0.0.1/index.php?category_id=&page=shop.browse&option=com_virtuemart&Itemid=1&keyword1=hand&search_op=and&keyword2=&search_limiter=anywhere&search=Search&search_category=3 AND $BLIND_SQL -- EXPLOIT: http://www.andreafabrizi.it/download.php?file=virtuemart_sql_exploit.sh