Information -------------------- Name :  SQL Injection Vulnerability in Batavi Software :  Batavi 1.1.2 and possibly below. Vendor Homepage :  http://www.batavi.org Vulnerability Type :  SQL Injection Severity :  Critical Researcher :  Onur Yılmaz Advisory Reference :  NS-12-003 Description -------------------- Batavi is an open source e-commerce platform. Details -------------------- Batavi is affected by a SQL Injection vulnerability in version 1.1.2.. Example PoC url is as follows : http://example.com/ajax.php (POST - Param: boxToReload) Solution -------------------- The vendor fixed this vulnerability in the new version. Please see the references. Advisory Timeline -------------------- 05/12/2011 - First contact: Sent the vulnerability details 19/12/2011 - Second contact: Ask for patch 18/01/2012 - Vulnerability Fixed in latest version 24/01/2012 - Vulnerability Released Credits -------------------- It has been discovered on testing of Netsparker, Web Application Security Scanner. References -------------------- Vendor Url / Patch : http://sourceforge.net/projects/batavi/files/ MSL Advisory Link : http://www.mavitunasecurity.com/sql-injection-vulnerability-in-batavi-ecommerce/ Netsparker Advisories : http://www.mavitunasecurity.com/netsparker-advisories/ About Netsparker -------------------- Netsparker® can find and report security issues such as SQL Injection and Cross-site Scripting (XSS) in all web applications regardless of the platform and the technology they are built on. Netsparker's unique detection and exploitation techniques allows it to be dead accurate in reporting hence it's the first and the only False Positive Free web application security scanner. -- Netsparker Advisories, Homepage, http://www.mavitunasecurity.com/netsparker-advisories/