MidiCart Shopping Cart Software database vulnerability

From: Dimitri Sekhniashvili (contrabandaat_private)
Date: Wed Aug 07 2002 - 01:22:51 PDT

  • Next message: Marc Maiffret: "RE: White paper: Exploiting the Win32 API."

    
     ('binary' encoding is not supported, stored as-is)
    Summary
    MIDICART is s an ASP and PHP based shopping Cart application with MS 
    Access and SQL database.
    A security vulnerability in the product allows remote attackers to 
    download the product's
    database, thus gain access to sensitive information about users of the 
    product 
    (name, surname, address, e-mail, phone number, credit card number, and 
    company name). 
    Example: 
    Accessing the following URL will return the database used by the product: 
    http://someshope.com/shoppingdirectory/midicart.mdb 
    
    Additional information 
    The information has been provided by Dimitri Sekhniashvili (CONTRABANDA)
    E-mail: contrabandaat_private 
    



    This archive was generated by hypermail 2b30 : Sat Aug 10 2002 - 18:29:14 PDT