Invicti Discovers a Critical SQL Injection in Batavi E-Commerce Web Application

Information

Advisory by Netsparker (now Invicti)
Name: SQL Injection Vulnerability in Batavi
Software: Batavi 1.1.2 and possibly below.
Vendor Homepage: http://www.batavi.org
Vulnerability Type: SQL Injection
Severity: Critical
Researcher: Onur Yılmaz
Advisory Reference: NS-12-003

Description

Batavi is an open-source e-commerce platform.

Details

Batavi is affected by a SQL Injection vulnerability in version 1.1.2.
Example PoC url is as follows: http://example.com/ajax.php (POST – Param: boxToReload)

Solution

The vendor fixed this vulnerability in the new version. Please see the references.

Advisory Timeline

05/12/2011 – First contact: Sent the vulnerability details
19/12/2011 – Second contact: Ask for a patch
18/01/2012 – Vulnerability Fixed in the latest version
24/01/2012 – Vulnerability Released

Credits

It has been discovered on testing of Invicti.

References

  1. Vendor URL / Patch: https://sourceforge.net/projects/batavi/files/
  2. MSL Advisory Link: /sql-injection-vulnerability-in-batavi-ecommerce/
  3. Invicti Advisories: /web-applications-advisories/

About Invicti

Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.