[原文]Multiple SQL injection vulnerabilities in Active Auction House allow remote attackers to execute arbitrary SQL commands via the (1) catid, (2) SortDir, or (3) Sortby parameter to default.asp, (4) itemID parameter to ItemInfo.asp, or (5) Email field to sendpassword.asp.
Active Auction House default.asp Multiple Parameter SQL Injection
Remote / Network Access
Loss of Confidentiality,
Loss of Integrity
Active Auction House contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the 'catid', 'SortDir' and 'Sortby' variables in the default.asp script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
Discovery of this vulnerability is credited to dcrab <email@example.com>.
Active Web Softwares Active Auction House
Active Auction House is reportedly affected by a SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in a SQL query.
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
No exploit is required.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: firstname.lastname@example.org <mailto:email@example.com>.