Description
Multiple SQL injection vulnerabilities in Shopweezle 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) itemID parameter to (a) login.php and (b) memo.php; and the (2) itemgr, (3) brandID, and (4) album parameters to (c) index.php. NOTE: this issue also produces resultant full path disclosure from invalid SQL queries.
Exploits (3)
References (10)
Core 10
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/24473
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19593
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/24472
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/17441
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/24471
Third Party Advisory x_refsource_misc
http://pridels0.blogspot.com/2006/04/shopweezle-20-multiple-vuln.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/25723
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/24470
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/1291
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/25724
Scores
EPSS
0.0190
EPSS Percentile
83.3%
Details
Status
published
Products (4)
kansok_communications/shopweezle
2.0
kansok_communications/shopweezle
2.0_personal
kansok_communications/shopweezle
2.0_professional
kansok_communications/shopweezle
2.0_professional_plus
Published
Apr 11, 2006
Tracked Since
Feb 18, 2026