Invicti Discovers a Critical SQL Injection in Batavi E-Commerce Web Application
Information
Advisory by Netsparker (now Invicti)
Name: SQL Injection Vulnerability in Batavi
Software: Batavi 1.1.2 and possibly below.
Vendor Homepage: http://www.batavi.org
Vulnerability Type: SQL Injection
Severity: Critical
Researcher: Onur Yılmaz
Advisory Reference: NS-12-003
Description
Batavi is an open-source e-commerce platform.
Details
Batavi is affected by a SQL Injection vulnerability in version 1.1.2.
Example PoC url is as follows: http://example.com/ajax.php (POST – Param: boxToReload)
Solution
The vendor fixed this vulnerability in the new version. Please see the references.
Advisory Timeline
05/12/2011 – First contact: Sent the vulnerability details
19/12/2011 – Second contact: Ask for a patch
18/01/2012 – Vulnerability Fixed in the latest version
24/01/2012 – Vulnerability Released
Credits
It has been discovered on testing of Invicti.
References
- Vendor URL / Patch: https://sourceforge.net/projects/batavi/files/
- MSL Advisory Link: /sql-injection-vulnerability-in-batavi-ecommerce/
- Invicti Advisories: /web-applications-advisories/
About Invicti
Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.