Speedy-Shop 2.0 CMS – Blind SQL injection vulnerability

Here another vuln I found in the last days on Speedy-Shop 2.0 CMS… the threat was fixed very quickly, nice job!

======== { Advisory 24/5/2010 } =========

Blind SQL injection vulnerability in Speedy-Shop 2.0 CMS

Vendor’s Description of Software:
# http://www.speedy-shop.com/

Application Info:
# Name: Speedy-Shop 2.0

Vulnerability Info:
# Type: Blind SQL injection Vulnerability
# Risk: High

# Fixed

Time Table:
# 17/05/2010 – Vendor notified.

The input passed via “idp” is not properly sanitised before being used in a sql query.


# Input validation of “idp” parameter should be filtered.

# http://%5Bsite%5D/dettagli.asp?sid=NULL&idp=1+[BSQLi]

# Discoverd By: Locu
# Website: https://xlocux.wordpress.com
# Contacts: xlocux[-at-]gmail.com

============== { EOF } ==============



Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s