Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Cyberstrong eShop SQL Injection Vulnerabilities


Vulnerability Assessment Details

Cyberstrong eShop SQL Injection Vulnerabilities

Vulnerability Assessment Summary
Checks for an SQL injection in Cyberstrong eShop v4.2

Detailed Explanation for this Vulnerability Assessment

The remote host is running Cyberstrong eShop, a shopping cart written
in ASP.

The remote version of this software contains several input validation
flaws leading to SQL injection vulnerabilities. A possible hacker may
exploit these flaws to affect database queries, possibly resulting in
disclosure of sensitive information (for example, the admin's user and
password) and attacks against the underlying database.

See also : http://archives.neohapsis.com/archives/bugtraq/2003-07/0006.html
Solution : None at this time
Network Security Threat Level: High

Networks Security ID: 14101, 14103, 14112

Vulnerability Assessment Copyright: Copyright (C) 2005 Josh Zlatin-Amishav

Cables, Connectors

Juniper SRX345 650-065042 8x RJ-45 8x SFP Security Services Gateway Appliance
$745.0
Juniper SRX345 650-065042 8x RJ-45 8x SFP Security Services Gateway Appliance pictureJuniper EX4300-48T-AFO Gigabit L3 Switch 48 x GE Port + 4 x QSFP+ 40G Dual AC
$1.0
Juniper EX4300-48T-AFO Gigabit L3 Switch 48 x GE Port + 4 x QSFP+ 40G Dual AC pictureFactory Sealed Juniper SRX5800-HC-FAN SRX5800 High Capacity Fan HSS
$94.0
Factory Sealed Juniper SRX5800-HC-FAN SRX5800 High Capacity Fan HSS pictureJuniper Networks SP7041 P/N740-013111 Module
$100.0
Juniper Networks SP7041 P/N740-013111 Module picture


Discussions

No Discussions have been posted on this vulnerability.