Please use CVE-2012-2236 for this issue. On Fri, Feb 24, 2012 at 8:58 PM, Laurelai <[email protected]> wrote:
> On 2/24/2012 3:21 PM, [email protected] wrote: > > You only gave them two days to respond? > > > Chris > > > > On 24.02.2012 08:08, Thomas Richards wrote: > > # Exploit Title: PHP Gift Registry 1.5.5 SQL Injection > # Date: 02/22/12 > # Author: G13 > # Software Link: https://sourceforge.net/projects/phpgiftreg/ > # Version: 1.5.5 > # Category: webapps (php) > # > > ##### Vulnerability ##### > > The userid parameter in the users.php file is vulnerable to SQL > Injection. > > A user must be signed in to exploit this. > > ##### Vendor Notification ##### > > 02/22/12 - Vendor Notified > 02/24/12 - No response, disclosure > > ##### Exploit ##### > http://localhost/phpgiftreg/users.php?action=edit&userid=[SQLi] > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > > Pretty sure this project is dead the last update to it was made > 2009-03-12 see http://sourceforge.net/projects/phpgiftreg/files/ , anyone > using it at this point needs to switch to another > product.<http://sourceforge.net/tracker/?func=detail&aid=3491557&group_id=110846&atid=657564> > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ >
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
