iScripts ReserveLogic 1.0 SQL Injection Vulnerability
Name iScripts ReserveLogic
Vendor http://www.iscripts.com
Versions Affected 1.0
Author Salvatore Fresta aka Drosophila
Website http://www.salvatorefresta.net
Contact salvatorefresta [at] gmail [dot] com
Date 2010-01-07
X. INDEX
I. ABOUT THE APPLICATION
II. DESCRIPTION
III. ANALYSIS
IV. SAMPLE CODE
V. FIX
I. ABOUT THE APPLICATION
iScripts ReserveLogic allows independent hotel/motels,
B&B, time-shares, campgrounds, tour companies, etc., to
take their business truly online with online reservation
and customer management.
II. DESCRIPTION
A numeric field is not properly sanitised before being
used in a SQL query.
III. ANALYSIS
Summary:
A) SQL Injection
A) SQL Injection
The pid parameter in packagedetails.php is not properly
sanitised before being used in a SQL query. Successful
exploitation requires that the pid value exists in the
database, or rather that is a real package id.
IV. SAMPLE CODE
A) SQL Injection
http://site/path/packagedetails.php?pid=1 UNION SELECT 1,2,3,4,5,6,7,8,9,10,11,12%23
V. FIX
No Fix.