[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    VirtueMart eCommerce for Joomla <= 1.1.6 Blind SQL Injection
From:       Andrea Fabrizi <andrea.fabrizi () gmail ! com>
Date:       2011-01-31 9:35:15
Message-ID: AANLkTime4yiAuAopsPMihUS0y6_Vs_zVogJJUovT9Nn4 () mail ! gmail ! com
[Download RAW message or body]

**************************************************************
Application: VirtueMart
Version affected: <= 1.1.6
Website: http://www.virtuemart.net/
Discovered By: Andrea Fabrizi
Email: andrea.fabrizi@gmail.com
Web: http://www.andreafabrizi.it
Vuln: Blind SQL Injection
**************************************************************

Blind SQL Injection found in "search_category" parameter.

Example:
http://127.0.0.1/index.php?category_id=&page=shop.browse&option=com_virtuemart&Itemid= \
1&keyword1=hand&search_op=and&keyword2=&search_limiter=anywhere&search=Search&search_category=3
 AND $BLIND_SQL --

EXPLOIT: http://www.andreafabrizi.it/download.php?file=virtuemart_sql_exploit.sh


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic