Multiple SQL injection vulnerabilities in PhpMyFactures 1.0, and possibly 1.2 and earlier, with magic_quotes_gpc disabled, allow remote attackers to execute arbitrary SQL commands via the (1) id_pays parameter in (a) /pays/modifier_pays.php; (2) id_produit, (3) quantite, (4) prix_ht, and (5) date parameter in (b) /stocks/ajouter.php; (6) id_cat parameter in (c) /produits/modifier_cat.php; (7) id_client parameter in (d) /clients/modifier_client.php; (8) id_remise parameter in (e) /remises/index.php; (9) id_taux parameter in (f) /tva/index.php; (10) ref_produit, and (11) id_stock parameter in (g) /stocks/index.php; (12) id_pays parameter in (h) /pays/index.php; and (13) id_cat parameter in (i) /produits/index.php.
Link | Tags |
---|---|
http://www.osvdb.org/26472 | vdb entry |
http://www.osvdb.org/26473 | vdb entry |
http://www.osvdb.org/26469 | vdb entry |
http://www.osvdb.org/26471 | vdb entry |
http://www.osvdb.org/26476 | vdb entry |
http://www.osvdb.org/26470 | vdb entry |
http://www.osvdb.org/26474 | vdb entry |
http://www.securityfocus.com/archive/1/437025/100/0/threaded | mailing list |
http://www.osvdb.org/26475 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27209 | vdb entry |
http://www.osvdb.org/26467 | vdb entry |
http://secunia.com/advisories/20642 | vendor advisory third party advisory exploit |
http://www.acid-root.new.fr/advisories/phpmyfactures.txt | vendor advisory exploit |
http://securityreason.com/securityalert/1111 | third party advisory |