Description
|
|
Multiple vulnerabilities have been discovered in WeBid, which can be exploited by malicious people to conduct SQL injection attacks.
1) Input passed via the "cart_order_id" and "total" POST parameters to validate.php (when "toocheckout" is set and "credit_card_processed" is set to "Y") is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
2) Input passed via the "startnow[]" POST parameter to yourauctions_p.php (when "action" is set to "delopenauctions") is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerabilities are confirmed in version 1.0.6. Other versions may also be affected.
|