Title: * AlstraSoft EPay Enterprise v4.0 Blind SQL Injection *
Author: * Don (BalcanCrew & BalcanHack )*
: * Http://www.alstrasoft.com/epay_enterprise.htm *
Version: x 4.0 *
Test Platform: * Apache/1.3.37 *
######################################## ####################################
# An attacker may execute arbitrary SQL statements on the vulnerable
System.
# This may compromise the integrity of your database and/or expose
Sensitive information.
# Depending on the back-end database in use,
# SQL injection vulnerabilities lead to varying levels of data/system
Access for the attacker.
# It may be possible to not only manipulate existing queries, but to UNION
In arbitrary data,
# Use subselects, or append additional queries. In some cases,
# It may be possible to read in or write out to files, or to execute shell
Commands on the underlying operating system.
# Certain SQL Servers such as Microsoft SQL Server contain stored and
Extended procedures (database server functions ).
# If an attacker can obtain access to these procedures it may be possible
To compromise the entire machine.
######################################## ####################################
Defects *
Http://www.bkjia.com/process.htm? Action = product & member = justme & product = 11-2% 2b2*3-6 & send = yes
* Problem fix :*
Script shoshould filter metacharacters from * user input *.
* Don *