[原文]Multiple SQL injection vulnerabilities in Softbiz Web Host Directory Script 1.1 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) cid parameter in search_result.php, (2) sbres_id parameter in review.php, (3) cid parameter in browsecats.php, (4) h_id parameter in email.php, and (5) an unspecified parameter to the search module.
Softbiz Web Host Directory search_result.php cid Parameter SQL Injection
Remote / Network Access
Loss of Confidentiality,
Loss of Integrity
Web Host Directory contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'search_result.php' script not properly sanitizing user-supplied input to the 'cid' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
r0t is credited with the discovery of this vulnerability.
SoftBiz Web Hosting Directory Script 1.1
Softbiz Web Host Directory Script is prone to multiple SQL injection vulnerabilities. These issues occur because the application fails to properly sanitize user-supplied input before using it in an SQL query.
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
Version 1.1 and earlier are affected; other versions may also be affected.