what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

geoauctionsSQL.txt

geoauctionsSQL.txt
Posted Jul 20, 2006
Authored by LBDT | Site newangels-team.eu

GeoAuctions Premier version 2.0.3 and GeoClassifieds Basic version 2.0.3 suffer from blind SQL injection flaws.

tags | exploit, sql injection
SHA-256 | c76935fa4653ae91652bb2c25d7cb4ec847848088a52129dc8030e9f35f32c57

geoauctionsSQL.txt

Change Mirror Download
------=_Part_10286_255599.1153211407989
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Be kind to publish it quickly,

Regards,

Angel Team

[NewAngels Advisory #12] GeoAuctions Enterprise & Others - Blind SQL
Injection Vulnerability
============================================================================================

Vendor => http://www.geodesicsolutions.com/

Date:
Jul 15 2006

Risk = HIGH

Version:
1.0.6

Credit:
=======
NewAngels Team (newangels-team.eu) - Discovered By LBDT

Description:
GeoAuctions Enterprise is our flagship auctions software product. Html
template based, endless auctions, Standard auctions,
Dutch auctions, Feedback rating system, Fees before and after the auction,
Buy Now, Site Balance system, Invoicing system,
and much, much, more... This auction software is designed for the serious
auction site owner.

Affected file:
index.php

Blind SQL Injection in "d" parameter. If there're no acumulative feedbacks
sql injection won't be possible...

Part of /classes/browse_display_auction.php:

$this->sql_query = "select * from ".$this->user_groups_price_plans_table."
where id = ".$show->SELLER;
$seller_group_result = $db->Execute($this->sql_query);
.
.
.
.
$template = str_replace("<<FEEDBACK_LINK>>",
"<a
href=".$this->configuration_data->AUCTIONS_FILE_NAME."?a=1030&b=".$id."&d=".$show->SELLER.
"
class=display_auction_value>".stripslashes(urldecode($this->messages[102717]))."</a>",$template);

Example:
http://www.site.com/GeoAuctionsEnterprise/index.php?a=1030&b=~ID_NUMBER~&d=~SELLER~

If it says "There are no current feedbacks" injection doesn't exist... But
if there're feedbacks:

http://www.site.com/GeoAuctionsEnterprise/index.php?a=1030&b=~ID_NUMBER~&d=[SQL]

Google search -> inurl:"index.php?a=1002"

I also have seen the same one in other company softwares but with other
parameters, eg:

Soft -> GeoAuctions Premier v2.0.3 & GeoClassifieds Basic Version v2.0.3

http://www.site.com/GeoAuctions/index.php?a=2&b=[SQL]

Google search -> inurl:"index.php?a=2"

I think that the vendor must check out all his packs. because the most of
'em have this vuln.

------=_Part_10286_255599.1153211407989
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Be kind to publish it quickly,<br><br>Regards,<br><br>Angel Team<br><br>[NewAngels Advisory #12] GeoAuctions Enterprise & Others - Blind SQL Injection Vulnerability<br>============================================================================================
<br><br>Vendor => <a href="http://www.geodesicsolutions.com/">http://www.geodesicsolutions.com/</a><br><br>Date:<br>Jul 15 2006<br><br>Risk = HIGH<br><br>Version:<br>1.0.6<br><br>Credit:<br>=======<br>NewAngels Team (newangels-team.eu
) - Discovered By LBDT<br><br>Description:<br>GeoAuctions Enterprise is our flagship auctions software product. Html template based, endless auctions, Standard auctions, <br>Dutch auctions, Feedback rating system, Fees before and after the auction, Buy Now, Site Balance system, Invoicing system,
<br>and much, much, more... This auction software is designed for the serious auction site owner.<br><br>Affected file:<br>index.php<br><br>Blind SQL Injection in "d" parameter. If there're no acumulative feedbacks sql injection won't be possible...
<br><br>Part of /classes/browse_display_auction.php:<br><br>$this->sql_query = "select * from ".$this->user_groups_price_plans_table." where id = ".$show->SELLER;<br>$seller_group_result = $db->Execute($this->sql_query);
<br>.<br>.<br>.<br>.<br>$template = str_replace("<<FEEDBACK_LINK>>",<br>"<a href=".$this->configuration_data->AUCTIONS_FILE_NAME."?a=1030&b=".$id."&d=".$show->SELLER.
<br>" class=display_auction_value>".stripslashes(urldecode($this->messages[102717]))."</a>",$template);<br><br>Example:<br><a href="http://www.site.com/GeoAuctionsEnterprise/index.php?a=1030&b=~ID_NUMBER~&d=~SELLER~">
http://www.site.com/GeoAuctionsEnterprise/index.php?a=1030&b=~ID_NUMBER~&d=~SELLER~</a><br><br>If it says "There are no current feedbacks" injection doesn't exist... But if there're feedbacks:<br><br><a href="http://www.site.com/GeoAuctionsEnterprise/index.php?a=1030&b=~ID_NUMBER~&d=[SQL]">
http://www.site.com/GeoAuctionsEnterprise/index.php?a=1030&b=~ID_NUMBER~&d=[SQL]</a><br><br>Google search -> inurl:"index.php?a=1002"<br><br>I also have seen the same one in other company softwares but with other parameters, eg:
<br><br>Soft -> GeoAuctions Premier v2.0.3 & GeoClassifieds Basic Version v2.0.3<br><br><a href="http://www.site.com/GeoAuctions/index.php?a=2&b=[SQL]">http://www.site.com/GeoAuctions/index.php?a=2&b=[SQL]</a>
<br><br>Google search -> inurl:"index.php?a=2"<br><br>I think that the vendor must check out all his packs. because the most of 'em have this vuln.<br>

------=_Part_10286_255599.1153211407989--
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close