SQL Injection in WeBid
Advisory ID: | HTB23292 |
Product: | WeBid |
Vendor: | WeBid |
Vulnerable Versions: | 1.1.2P2 and probably prior |
Tested Version: | 1.1.2P2 |
Advisory Publication: | January 22, 2016 [without technical details] |
Vendor Notification: | January 22, 2016 |
Vendor Fix: | February 4, 2016 |
Public Disclosure: | February 17, 2016 |
Vulnerability Type: | SQL Injection [CWE-89] |
CVE Reference: | Pending |
Risk Level: | High |
CVSSv2 Base Score: | 7.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L] |
Solution Status: | Fixed by Vendor |
Discovered and Provided: | High-Tech Bridge Security Research Lab |
Advisory Details: | |
High-Tech Bridge Security Research Lab discovered SQL Injection vulnerability in a poplar web auction software WeBid. The vulnerability can be exploited by remote non-authenticated attacker to alter present SQL query and execute arbitrary SQL commands in application's database. Successful exploitation of the vulnerability will allow attacker to read, modify and delete arbitrary records in the database of vulnerable web application and gain complete control over the website. | |
Solution: | |
Apply vendor's security patch for WeBid 1.1.2P2 More Information: http://webidsupport.com/forums/index.php?threads/security-patch-for-1-1-2p2-and-older.9078/ | |
References: | |
[1] High-Tech Bridge Advisory HTB23292 - https://www.immuniweb.com/advisory/HTB23292 - SQL Injection in WeBid [2] WeBid - http://www.webidsupport.com/ - WeBid is the perfect way to get your auction site up and away [3] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types. [4] ImmuniWeb® - Leveraging the power of machine-learning and genius of human brain to deliver the most advanced web application security and penetration testing. [5] ImmuniWeb® SSLScan - Test your servers for security and compliance with PCI DSS, HIPAA and NIST. | |
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.