Invicti Discovers a Critical SQL Injection in Batavi E-Commerce Web Application
Advisory by Netsparker (now Invicti)
Name: SQL Injection Vulnerability in Batavi
Software: Batavi 1.1.2 and possibly below.
Vendor Homepage: http://www.batavi.org
Vulnerability Type: SQL Injection
Researcher: Onur Yılmaz
Advisory Reference: NS-12-003
Batavi is an open-source e-commerce platform.
Batavi is affected by a SQL Injection vulnerability in version 1.1.2.
Example PoC url is as follows: http://example.com/ajax.php (POST – Param: boxToReload)
The vendor fixed this vulnerability in the new version. Please see the references.
05/12/2011 – First contact: Sent the vulnerability details
19/12/2011 – Second contact: Ask for a patch
18/01/2012 – Vulnerability Fixed in the latest version
24/01/2012 – Vulnerability Released
It has been discovered on testing of Invicti.
- Vendor URL / Patch: http://sourceforge.net/projects/batavi/files/
- MSL Advisory Link: /sql-injection-vulnerability-in-batavi-ecommerce/
- Invicti Advisories: /web-applications-advisories/
Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.