[VIM] source verify of "Ban v0.1" SQL injection

Steven M. Christey coley at mitre.org
Tue Nov 14 19:09:50 EST 2006


Researcher: Francesco Laurita
Reference: Re: Ban v0.1 (bannieres.php) File Include
   http://www.securityfocus.com/archive/1/archive/1/449955/100/200/threaded

Source inspection by a senior CVE analyst says:

  The code has

    $res=mysql_query("SELECT * FROM bannieres WHERE id='$id'");
    ...
    mysql_query("UPDATE bannieres SET affichage = affichage + 1 WHERE id='$id'");.

Also, based on the download, the product name used by the researcher
does not match the name shown within the product. Files in the
download say "SCRIPT BANNIERES ... Jean-Christophe Ramos."  However, a
search on ComScripts.com associates the script with the name
"ban0.1.", probably based on the name of the ZIP file.


- Steve


More information about the VIM mailing list